T1102.003 One-Way Communication Mappings

Adversaries may use an existing, legitimate external Web service as a means for sending commands to a compromised system without receiving return output over the Web service channel. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service. Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response.

Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-4 Information Flow Enforcement Protects T1102.003 One-Way Communication
CA-7 Continuous Monitoring Protects T1102.003 One-Way Communication
CM-2 Baseline Configuration Protects T1102.003 One-Way Communication
CM-6 Configuration Settings Protects T1102.003 One-Way Communication
CM-7 Least Functionality Protects T1102.003 One-Way Communication
SC-7 Boundary Protection Protects T1102.003 One-Way Communication
SI-3 Malicious Code Protection Protects T1102.003 One-Way Communication
SI-4 System Monitoring Protects T1102.003 One-Way Communication
action.malware.variety.C2 Command and control (C2) related-to T1102.003 Web Service: One-Way Communication