Thanks to all of our ATT&CKcon participants. All sessions are here, and individual presentations will be posted soon.

Exfiltration Over Command and Control Channel

Data exfiltration is performed over the Command and Control channel. Data is encoded into the normal communications channel using the same protocol as command and control communications.

ID: T1041

Tactic: Exfiltration

Platform:  Linux, macOS, Windows

Data Sources:  User interface, Process monitoring

Requires Network:  Yes

Version: 1.0

Examples

NameDescription
ADVSTORESHELL

ADVSTORESHELL exfiltrates data over the same channel used for C2.[1]

APT3

APT3 has a tool that exfiltrates data over the C2 channel.[2]

BACKSPACE

Adversaries can direct BACKSPACE to upload files to the C2 Server.[3]

Bankshot

Bankshot exfiltrates data over its C2 channel.[4]

CallMe

CallMe exfiltrates data to its C2 server over the same protocol as C2 communications.[5]

Gamaredon Group

A Gamaredon Group file stealer transfers collected files to a hardcoded C2 server.[6]

Ke3chang

Ke3chang transferred compressed and encrypted RAR files containing exfiltration through the established backdoor command and control channel during operations.[7]

Lazarus Group

Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is uploaded to one of its 10 C2 servers. Another Lazarus Group malware sample also performs exfiltration over the C2 channel.[8][9][10]

MobileOrder

MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.[5]

NETEAGLE

NETEAGLE is capable of reading files over the C2 channel.[3]

OopsIE

OopsIE can upload files from the victim's machine to its C2 server.[11]

Proxysvc

Proxysvc performs data exfiltration over the control server channel using a custom protocol.[12]

Psylo

Psylo exfiltrates data to its C2 server over the same protocol as C2 communications.[5]

Pteranodon

Pteranodon exfiltrates screenshot files to its C2 server.[6]

Pupy

Pupy can send screenshots files, keylogger data, files, and recorded audio back to the C2 server.[13]

ROKRAT

ROKRAT sends collected files back over same C2 channel.[14]

Stealth Falcon

After data is collected by Stealth Falcon malware, it is exfiltrated over the existing C2 channel.[15]

Mitigation

Mitigations for command and control apply. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific obfuscation technique used by a particular adversary or tool, and will likely be different across various malware families and versions. Adversaries will likely change tool command and control signatures over time or construct protocols in such a way to avoid detection by common defensive tools. [16]

Detection

Detection for command and control applies. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. [16]

References