Automated Exfiltration: Traffic Duplication

Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised network infrastructure. Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a network analyzer or other monitoring device. [1] [2]

Adversaries may abuse traffic mirroring to mirror or redirect network traffic through other network infrastructure they control. Malicious modifications to network devices to enable traffic redirection may be possible through ROMMONkit or Patch System Image.[3][4] Adversaries may use traffic duplication in conjunction with Network Sniffing, Input Capture, or Man-in-the-Middle depending on the goals and objectives of the adversary.

ID: T1020.001
Sub-technique of:  T1020
Tactic: Exfiltration
Platforms: Network
Permissions Required: Administrator
Data Sources: Netflow/Enclave netflow, Network protocol analysis, Packet capture
CAPEC ID: CAPEC-117
Version: 1.0
Created: 19 October 2020
Last Modified: 22 October 2020

Mitigations

Mitigation Description
Encrypt Sensitive Information

Ensure that all wired and/or wireless traffic is encrypted appropriately. Use best practices for authentication protocols, such as Kerberos, and ensure web traffic that may contain credentials is protected by SSL/TLS.

Detection

Monitor network traffic for uncommon data flows (e.g. unusual network communications, suspicious communications that have never been seen before, communications sending fixed size data packets at regular intervals). Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used.

References