Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.
ID | Name | Description |
---|---|---|
S1061 | AbstractEmu |
AbstractEmu can send large amounts of device data over its C2 channel, including the device’s manufacturer, model, version and serial number, telephone number, and IP address.[1] |
S1095 | AhRat |
AhRat can exfiltrate collected data to the C2, such as audio recordings and files.[2] |
S1079 | BOULDSPY |
BOULDSPY has exfiltrated cached data from infected devices.[3] |
S1094 | BRATA |
BRATA has exfiltrated data to the C2 server using HTTP requests.[4] |
C0033 | C0033 |
During C0033, PROMETHIUM used StrongPity to exfiltrate to the C2 server using HTTPS.[5][6] |
S1083 | Chameleon | |
S1054 | Drinik | |
S0507 | eSurv | |
S1080 | Fakecalls |
Fakecalls can send exfiltrated data back to the C2 server.[10] |
S1067 | FluBot | |
S1093 | FlyTrap |
FlyTrap can use HTTP to exfiltrate data to the C2 server.[12] |
S0551 | GoldenEagle |
GoldenEagle has exfiltrated data via both SMTP and HTTP.[13] |
S0421 | GolfSpy | |
S1077 | Hornbill |
Hornbill can exfiltrate data back to the C2 server using HTTP.[15] |
C0016 | Operation Dust Storm |
During Operation Dust Storm, the threat actors used Android backdoors that would send information and data from a victim's mobile device to the C2 servers.[16] |
S0399 | Pallas | |
S0326 | RedDrop | |
S1055 | SharkBot |
SharkBot can exfiltrate captured user credentials and event logs back to the C2 server. [19] |
S1082 | Sunbird |
Sunbird can exfiltrate compressed ZIP files containing gathered info to C2 infrastructure.[15] |
S0424 | Triada |
Triada utilized HTTP to exfiltrate data through POST requests to the command and control server.[20] |
S0418 | ViceLeaker |
ViceLeaker uses HTTP data exfiltration.[21][22] |
S0490 | XLoader for iOS |
XLoader for iOS has exfiltrated data using HTTP requests.[23] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
Exfiltration Over C2 Channel can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.