Common Information
Type Value
Value
Bidirectional Communication - T1102.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use an existing, legitimate external Web service as a means for sending commands to and receiving output from a compromised system over the Web service channel. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems can then send the output from those commands back over that Web service channel. The return traffic may occur in a variety of ways, depending on the Web service being utilized. For example, the return traffic may take the form of the compromised system posting a comment on a forum, issuing a pull request to development project, updating a document hosted on a Web service, or by sending a Tweet. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.
Details Published Attributes CTI Title
Details Website 2024-11-08 11 What is protocol?
Details Website 2024-11-04 12 ToxicPanda: a new banking trojan from Asia hit Europe and LATAM | Cleafy Labs
Details Website 2024-10-25 2 Elephants in tunnels: how Hyperdrive connects to databases inside your VPC networks
Details Website 2024-10-25 2 WebSockets Unveiled: Powering Immersive and Interactive Web Experiences
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium
Details Website 2024-10-02 57 Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
Details Website 2024-07-11 26 MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2
Details Website 2024-01-01 0 macOS Terms and Trends You Should Know About | Huntress
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-10-13 24 An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit
Details Website 2023-10-13 7 Don’t Talk All at Once! Elevating Privileges on macOS by Audit Token Spoofing
Details Website 2023-09-22 56 Examining the Activities of the Turla APT Group
Details Website 2023-09-22 57 Examining the Activities of the Turla APT Group
Details Website 2023-09-17 36 RedLine Stealer : A new variant surfaces, Deploying using Batch Script - CYFIRMA
Details Website 2023-08-29 0 MMRat Carries Out Bank Fraud Via Fake App Stores
Details Website 2023-08-25 195 Russia/Ukraine Update - August 2023
Details Website 2023-08-24 28 XWorm: Technical Analysis of a New Malware Version 
Details Website 2023-07-26 7 The Missing Layer of the Internet: (Self-Sovereign) Identity
Details Website 2023-07-25 6 APT Profile: Kimsuky - SOCRadar® Cyber Intelligence Inc.
Details Website 2023-06-17 15 “Securing the Future: Cybersecurity in the Era of Advanced Threats with Julia”
Details Website 2023-04-19 0 How enterprises can stay ahead of risks, threats and potential attacks [Q&A]
Details Website 2023-03-22 9 APT Profile: Sandworm - SOCRadar® Cyber Intelligence Inc.
Details Website 2023-03-14 12 NOBELIUM Uses Poland's Ambassador’s Visit to the U.S. to Target EU Governments Assisting Ukraine
Details Website 2023-03-13 0 IoT Protocols(MQTT ve CoAP)