Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.
ID | Name | Description |
---|---|---|
S0504 | Anchor |
Anchor can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.[1] |
S0622 | AppleSeed |
AppleSeed can use a second channel for C2 when the primary channel is in upload mode.[2] |
G0096 | APT41 |
APT41 used the Steam community page as a fallback mechanism for C2.[3] |
S0534 | Bazar |
Bazar has the ability to use an alternative C2 server if the primary server fails.[4] |
S0017 | BISCUIT |
BISCUIT malware contains a secondary fallback command and control server that is contacted after the primary command and control server.[5][6] |
S0089 | BlackEnergy |
BlackEnergy has the capability to communicate over a backup channel via plus.google.com.[7] |
S1039 | Bumblebee |
Bumblebee can use backup C2 servers if the primary server fails.[8] |
S0348 | Cardinal RAT |
Cardinal RAT can communicate over multiple C2 host and port combinations.[9] |
S0674 | CharmPower |
CharmPower can change its C2 channel once every 360 loops by retrieving a new domain from the actors’ S3 bucket.[10] |
S0023 | CHOPSTICK |
CHOPSTICK can switch to a new C2 channel if the current one is broken.[11] |
S0538 | Crutch |
Crutch has used a hardcoded GitHub repository as a fallback channel.[12] |
S0021 | Derusbi |
Derusbi uses a backup communication method with an HTTP beacon.[13] |
S0062 | DustySky |
DustySky has two hard-coded domains for C2 servers; if the first does not respond, it will try the second.[14] |
S0377 | Ebury |
Ebury has implemented a fallback mechanism to begin using a DGA when the attacker hasn't connected to the infected system for three days.[15] |
S0401 | Exaramel for Linux |
Exaramel for Linux can attempt to find a new C2 server if it receives an error.[16] |
S0512 | FatDuke |
FatDuke has used several C2 servers per targeted organization.[17] |
G0046 | FIN7 |
FIN7's Harpy backdoor malware can use DNS as a backup channel for C2 if HTTP fails.[18] |
S0666 | Gelsemium | |
S0376 | HOPLIGHT |
HOPLIGHT has multiple C2 channels in place in case one fails.[20] |
S0260 | InvisiMole |
InvisiMole has been configured with several servers available for alternate C2 communications.[21][22] |
S0044 | JHUHUGIT |
JHUHUGIT tests if it can reach its C2 server by first attempting a direct connection, and if it fails, obtaining proxy settings and sending the connection through a proxy, and finally injecting code into a running browser if the proxy method fails.[23] |
S0265 | Kazuar | |
S1020 | Kevin | |
S0236 | Kwampirs |
Kwampirs uses a large list of C2 servers that it cycles through until a successful connection is established.[26] |
G0032 | Lazarus Group |
Lazarus Group malware SierraAlfa sends data to one of the hard-coded C2 servers chosen at random, and if the transmission fails, chooses a new C2 server to attempt the transmission again.[27][28] |
S0211 | Linfo |
Linfo creates a backdoor through which remote attackers can change C2 servers.[29] |
S0409 | Machete |
Machete has sent data over HTTP if FTP failed, and has also used a fallback server.[30] |
S0051 | MiniDuke |
MiniDuke uses Google Search to identify C2 servers if its primary C2 method via Twitter is not working.[31] |
S0084 | Mis-Type |
Mis-Type first attempts to use a Base64-encoded network protocol over a raw TCP socket for C2, and if that method fails, falls back to a secondary HTTP-based protocol to communicate to an alternate C2 server.[32] |
S0699 | Mythic |
Mythic can use a list of C2 URLs as fallback mechanisms in case one IP or domain gets blocked.[33] |
S0034 | NETEAGLE |
NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request; otherwise it will send beacons via UDP/6000.[34] |
C0002 | Night Dragon |
During Night Dragon, threat actors used company extranet servers as secondary C2 servers.[35] |
G0049 | OilRig |
OilRig malware ISMAgent falls back to its DNS tunneling mechanism if it is unable to reach the C2 server over HTTP.[36] |
S0501 | PipeMon |
PipeMon can switch to an alternate C2 domain when a particular date has been reached.[37] |
S0269 | QUADAGENT |
QUADAGENT uses multiple protocols (HTTPS, HTTP, DNS) for its C2 server as fallback channels if communication with one is unsuccessful.[38] |
S1084 | QUIETEXIT |
QUIETEXIT can attempt to connect to a second hard-coded C2 if the first hard-coded C2 address fails.[39] |
S0629 | RainyDay |
RainyDay has the ability to switch between TCP and HTTP for C2 if one method is not working.[40] |
S0495 | RDAT |
RDAT has used HTTP if DNS C2 communications were not functioning.[41] |
S0085 | S-Type |
S-Type primarily uses port 80 for C2, but falls back to ports 443 or 8080 if initial communication fails.[32] |
S1019 | Shark |
Shark can update its configuration to use a different C2 server.[42] |
S0444 | ShimRat |
ShimRat has used a secondary C2 location if the first was unavailable.[43] |
S0610 | SideTwist |
SideTwist has primarily used port 443 for C2 but can use port 80 as a fallback.[44] |
S0058 | SslMM | |
S0603 | Stuxnet | |
S0586 | TAINTEDSCRIBE |
TAINTEDSCRIBE can randomly pick one of five hard-coded IP addresses for C2 communication; if one of the IP fails, it will wait 60 seconds and then try another IP address.[47] |
S0668 | TinyTurla |
TinyTurla can go through a list of C2 server IPs and will try to register with each until one responds.[48] |
S0266 | TrickBot |
TrickBot can use secondary C2 servers for communication after establishing connectivity and relaying victim information to primary C2 servers.[1] |
S0022 | Uroburos |
Uroburos can use up to 10 channels to communicate between implants.[49] |
S0476 | Valak | |
S0059 | WinMM |
WinMM is usually configured with primary and backup domains for C2 communications.[45] |
S0117 | XTunnel |
The C2 server used by XTunnel provides a port number to the victim to use as a fallback in case the connection closes on the currently used port.[11] |
ID | Mitigation | Description |
---|---|---|
M1031 | Network Intrusion Prevention |
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific protocol used by a particular adversary or tool, and will likely be different across various malware families and versions. Adversaries will likely change tool C2 signatures over time or construct protocols in such a way as to avoid detection by common defensive tools. [51] |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0029 | Network Traffic | Network Connection Creation |
Monitor for newly constructed network connections that may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds. Processes utilizing the network that do not normally have network communication or have never been seen before may be suspicious. Note: Network Analysis frameworks such as Zeek can be used to capture, decode, and alert on TCP network connection creation. The below analytic is using an event ID from OSQuery. |
Network Traffic Flow |
Monitor network data for uncommon data flows, such as unexpected surges or other abnormal inbound/outbound patterns. |