Common Information
Type | Value |
---|---|
Value |
Data Encoding - T1132 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Command and control (C2) information is encoded using a standard data encoding system. Use of data encoding may be to adhere to existing protocol specifications and includes use of ASCII, Unicode, Base64, MIME, UTF-8, or other binary-to-text and character encoding systems. (Citation: Wikipedia Binary-to-text Encoding) (Citation: Wikipedia Character Encoding) Some data encoding systems may also result in data compression, such as gzip. Detection: Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Packet capture, Process use of network, Process Monitoring, Network protocol analysis Permissions Required: User Requires Network: Yes Contributors: Itzik Kotler, SafeBreach |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-05-30 | 18 | Decoding Water Sigbin's Latest Obfuscation Tricks | ||
Details | Website | 2024-05-30 | 19 | Decoding Water Sigbin's Latest Obfuscation Tricks | ||
Details | Website | 2024-05-22 | 48 | Invisible miners: unveiling GHOSTENGINE’s crypto mining operations — Elastic Security Labs | ||
Details | Website | 2024-05-16 | 23 | Tracking the Progression of Earth Hundun's Cyberespionage Campaign in 2024 | ||
Details | Website | 2024-05-15 | 45 | To the Moon and back(doors): Lunar landing in diplomatic missions | ||
Details | Website | 2024-04-17 | 90 | Malvertising campaign targeting IT teams with MadMxShell | ||
Details | Website | 2024-04-11 | 94 | Cybercriminal Campaign Spreads Infostealers, Highlighting Risks to Web3 Gaming | Recorded Future | ||
Details | Website | 2024-04-11 | 24 | Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear | ||
Details | Website | 2024-02-26 | 32 | Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections | ||
Details | Website | 2024-02-26 | 32 | Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-10-24 | 95 | Атаки на индустриальный и государственный секторы РФ | ||
Details | Website | 2023-10-24 | 36 | Dealing with MITRE ATT&CK®’s different levels of detail | ||
Details | Website | 2023-10-23 | 273 | Red Team Tools | ||
Details | Website | 2023-10-20 | 59 | Akira Stealer : An Undetected Python Based Info-stealer - CYFIRMA | ||
Details | Website | 2023-10-16 | 106 | ClearFake: a newcomer to the "fake updates" threats landscape | ||
Details | Website | 2023-10-05 | 6 | APT Profile: Dark Pink APT Group | ||
Details | Website | 2023-10-04 | 33 | RMS Tool's Sneaky Comeback: Phishing Campaign Mirroring Banned Applications | ||
Details | Website | 2023-10-03 | 23 | Statc Stealer: Decoding the Elusive Malware Threat | ||
Details | Website | 2023-10-03 | 161 | JanelaRAT: Repurposed BX Rat Variant Targeting LATAM FinTech | ||
Details | Website | 2023-09-26 | 34 | Analyzing Lu0Bot: A Node.js Malware with Vast Capabilities | ||
Details | Website | 2023-09-21 | 21 | Multiple Command and Control (C2) Frameworks During Red Team Engagements | ||
Details | Website | 2023-09-15 | 25 | Bumblebee Loader Resurfaces in New Campaign | ||
Details | Website | 2023-09-14 | 35 | Operation Rusty Flag – A Malicious Campaign Against Azerbaijanian Targets | Deep Instinct | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 |