Encrypted Channel

Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generated within malware samples/configuration files.

ID: T1573
Sub-techniques:  T1573.001, T1573.002
Platforms: ESXi, Linux, Network Devices, Windows, macOS
Version: 1.2
Created: 16 March 2020
Last Modified: 24 October 2025

Procedure Examples

ID Name Description
G0016 APT29

APT29 has used multiple layers of encryption within malware to protect C2 communication.[1]

G1002 BITTER

BITTER has encrypted their C2 communications.[2]

S0631 Chaes

Chaes has used encryption for its C2 channel.[3]

S0498 Cryptoistic

Cryptoistic can engage in encrypted communications with C2.[4]

S0367 Emotet

Emotet has encrypted data before sending to the C2 server.[5]

S0032 gh0st RAT

gh0st RAT has encrypted TCP communications to evade detection.[6]

S1198 Gomir

Gomir uses a custom encryption algorithm for content sent to command and control infrastructure.[7]

C0035 KV Botnet Activity

KV Botnet Activity command and control activity includes transmission of an RSA public key in communication from the server, but this is followed by subsequent negotiation stages that represent a form of handshake similar to TLS negotiation.[8]

S0681 Lizar

Lizar can support encrypted communications between the client and server.[9][10][11]

S1016 MacMa

MacMa has used TLS encryption to initialize a custom protocol for C2 communications.[12]

G0059 Magic Hound

Magic Hound has used an encrypted http proxy in C2 communications.[13]

S0198 NETWIRE

NETWIRE can encrypt C2 communications.[14]

S1012 PowerLess

PowerLess can use an encrypted channel for C2 communications.[15]

S1046 PowGoop

PowGoop can receive encrypted commands from C2.[16]

S0662 RCSession

RCSession can use an encrypted beacon to check in with C2.[17]

C0030 Triton Safety Instrumented System Attack

In the Triton Safety Instrumented System Attack, TEMP.Veles used cryptcat binaries to encrypt their traffic.[18]

G0081 Tropic Trooper

Tropic Trooper has encrypted traffic with the C2 to prevent network detection.[19]

Mitigations

ID Mitigation Description
M1031 Network Intrusion Prevention

Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.

M1020 SSL/TLS Inspection

SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols.

Detection Strategy

ID Name Analytic ID Analytic Description
DET0273 Detection Strategy for Encrypted Channel across OS Platforms AN0759

Processes that normally do not initiate network connections establishing outbound encrypted TLS/SSL sessions, especially with asymmetric traffic volumes (client sending more than receiving) or non-standard certificate chains. Defender observations correlate process creation with unexpected network encryption libraries being loaded.

AN0760

Processes like curl, wget, python, socat, or custom binaries initiating TLS/SSL sessions to non-standard destinations. Defender sees abnormal syscalls for connect(), loading of libssl libraries, and persistent outbound encrypted traffic from daemons not normally communicating externally.

AN0761

Applications or launchd jobs initiating encrypted TLS traffic to rare external hosts. Defender observes unified logs showing ssl/TLS API calls by processes not baseline-approved, and payload entropy suggesting encrypted C2 sessions.

AN0762

VMware management daemons or guest processes initiating encrypted connections outside expected vCenter, update servers, or internal comms. Defender identifies hostd or vpxa initiating outbound TLS flows with uncommon destinations.

AN0763

Unusual TLS tunnels through ports not normally encrypted (e.g., TLS on port 8080, 53). Defender sees NetFlow/IPFIX or packet inspection indicating high-entropy traffic volumes and asymmetric client/server exchange ratios.

References