| ID | Name |
|---|---|
| T1071.001 | Web Protocols |
| T1071.002 | File Transfer Protocols |
| T1071.003 | Mail Protocols |
| T1071.004 | DNS |
| T1071.005 | Publish/Subscribe Protocols |
Adversaries may communicate using application layer protocols associated with transferring files to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server.
Protocols such as SMB[1], FTP[2], FTPS, and TFTP that transfer files may be very common in environments. Packets produced from these protocols may have many fields and headers in which data can be concealed. Data could also be concealed within the transferred files. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.
| ID | Name | Description |
|---|---|---|
| G0096 | APT41 |
APT41 used exploit payloads that initiate download via ftp.[3] |
| S0438 | Attor | |
| S1081 | BADHATCH |
BADHATCH can emulate an FTP server to connect to actor-controlled C2 servers.[5] |
| S0465 | CARROTBALL |
CARROTBALL has the ability to use FTP in C2 communications.[6] |
| S0154 | Cobalt Strike |
Cobalt Strike can conduct peer-to-peer communication over Windows named pipes encapsulated in the SMB protocol. All protocols use their standard assigned ports.[7][8] |
| S1088 | Disco | |
| G0035 | Dragonfly | |
| S1229 | Havoc |
Havoc can use an SMB listener for C2 communication.[10][11][12] |
| S0201 | JPIN | |
| S0265 | Kazuar |
Kazuar uses FTP and FTPS to communicate with the C2 server.[14] |
| G0094 | Kimsuky |
Kimsuky has used FTP to download additional malware to the target machine.[15] |
| S0409 | Machete | |
| S0699 | Mythic | |
| S0353 | NOKKI | |
| C0006 | Operation Honeybee |
During Operation Honeybee, the threat actors had the ability to use FTP for C2.[20] |
| S0428 | PoetRAT | |
| S1228 | PUBLOAD | |
| C0055 | Quad7 Activity |
Quad7 Activity has used a File Transfer Protocol (FTP) server to download malicious binaries.[23] |
| S0019 | Regin |
The Regin malware platform supports many standard protocols, including SMB.[24] |
| S0596 | ShadowPad | |
| S1089 | SharpDisco |
SharpDisco has the ability to transfer data between SMB shares.[9] |
| G0083 | SilverTerrier |
SilverTerrier uses FTP for C2 communications.[26] |
| S0464 | SYSCON |
SYSCON has the ability to use FTP in C2 communications.[27][6] |
| S0161 | XAgentOSX |
XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.[28] |
| S0412 | ZxShell |
| ID | Mitigation | Description |
|---|---|---|
| M1037 | Filter Network Traffic |
Filter outbound FTP/SFTP traffic from sensitive systems, allowing file transfers only to trusted internal or known IP addresses. This measure can prevent attackers from transferring data or payloads via FTP/SFTP channels to or from unauthorized external systems. |
| M1031 | Network Intrusion Prevention |
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0416 | Detection of File Transfer Protocol-Based C2 (FTP, FTPS, SMB, TFTP) | AN1169 |
Detects FTP, SMB, or TFTP traffic initiated by suspicious processes like PowerShell, cmd.exe, or rundll32.exe—especially with large outbound file transfers or unbalanced traffic volume. |
| AN1170 |
Detects usage of FTP, SCP, or TFTP by non-interactive shells or automation scripts transferring large data volumes to untrusted IPs. |
||
| AN1171 |
Detects Automator, AppleScript, or Terminal executing curl, lftp, or TFTP for binary transfer to untrusted IPs or unusual ports. |
||
| AN1172 |
Detects file movement or outbound TFTP/FTP transfers from ESXi host initiated via shell commands or injected scripts, particularly from scratch partitions or /tmp. |
||
| AN1173 |
Detects internal hosts generating large outbound FTP/TFTP/SMB sessions to external IPs, or file transfers using non-standard ports and application mismatches (e.g., FTP over port 80). |