| ID | Name |
|---|---|
| T1016.001 | Internet Connection Discovery |
| T1016.002 | Wi-Fi Discovery |
Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using Ping, tracert, and GET requests to websites, or performing initial speed testing to confirm bandwidth.
Adversaries may use the results and responses from these requests to determine if the system is capable of communicating with their C2 servers before attempting to connect to them. The results may also be used to identify routes, redirectors, and proxy servers.
| ID | Name | Description |
|---|---|---|
| G0016 | APT29 |
APT29 has ensured web servers in a victim environment are Internet accessible before copying tools or malware to it.[1] |
| S1066 | DarkTortilla |
DarkTortilla can check for internet connectivity by issuing HTTP GET requests.[2] |
| G1016 | FIN13 |
FIN13 has used |
| G0061 | FIN8 |
FIN8 has used the Ping command to check connectivity to actor-controlled C2 servers.[4] |
| G0047 | Gamaredon Group |
Gamaredon Group has tested connectivity between a compromised machine and a C2 server using Ping with commands such as |
| S0597 | GoldFinder |
GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through.[7] |
| G0125 | HAFNIUM |
HAFNIUM has checked for network connectivity from a compromised host using |
| S1229 | Havoc |
The Havoc demon can check for a connection to the C2 server from the target machine.[9] |
| G1001 | HEXANE |
HEXANE has used tools including BITSAdmin to test internet connectivity from compromised hosts.[10] |
| G0030 | Lotus Blossom |
Lotus Blossom has performed checks to determine if a victim machine is able to access the Internet.[11] |
| G0059 | Magic Hound |
Magic Hound has conducted a network call out to a specific website as part of their initial discovery activity.[12] |
| S0284 | More_eggs |
More_eggs has used HTTP GET requests to check internet connectivity.[13] |
| S0691 | Neoichor |
Neoichor can check for Internet connectivity by contacting bing[.]com with the request format |
| S1107 | NKAbuse |
NKAbuse utilizes external services such as |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity.[16] |
| S1228 | PUBLOAD |
PUBLOAD has identified internet connectivity details through commands such as |
| S0650 | QakBot |
QakBot can measure the download speed on a targeted host.[18] |
| S0686 | QuietSieve |
QuietSieve can check C2 connectivity with a |
| S0448 | Rising Sun |
Rising Sun can test a connection to a specified network IP address over a specified port number.[20] |
| C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.[7] |
| S1049 | SUGARUSH |
SUGARUSH has checked for internet connectivity from an infected host before attempting to establish a new TCP connection.[21] |
| S0663 | SysUpdate |
SysUpdate can contact the DNS server operated by Google as part of its C2 establishment process.[22] |
| G1018 | TA2541 |
TA2541 has run scripts to check internet connectivity from compromised hosts. [23] |
| G0010 | Turla | |
| G1017 | Volt Typhoon |
Volt Typhoon has employed Ping to check network connectivity.[25] |
| S1065 | Woody RAT |
Woody RAT can make |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0357 | Behavioral Detection of Internet Connection Discovery | AN1015 |
Execution of utilities (e.g., ping, tracert, Test-NetConnection) or scripted methods to test Internet connectivity by interacting with external IPs/domains. |
| AN1016 |
Execution of ping, traceroute, or curl/wget against public IPs/domains to verify Internet reachability. |
||
| AN1017 |
Execution of ping, traceroute, or network utility tools to external destinations; may include |
||
| AN1018 |
Execution of |