Common Information
Type | Value |
---|---|
Value |
Exfiltration Over Alternative Protocol - T1048 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Data exfiltration is performed with a different protocol from the main command and control protocol or channel. The data is likely to be sent to an alternate network location from the main command and control server. Alternate protocols include FTP, SMTP, HTTP/S, DNS, or some other network protocol. Different channels could include Internet Web services such as cloud storage. Detection: Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: User interface, Process monitoring, Process use of network, Packet capture, Netflow/Enclave netflow, Network protocol analysis Requires Network: Yes |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-11-28 | 81 | Aki-RATs - Command and Control Party | ||
Details | Website | 2023-11-20 | 44 | Is this the real life? Is this just fantasy? Caught in a landslide, NoEscape from NCC Group | ||
Details | Website | 2023-11-06 | 47 | D0nut encrypt me, I have a wife and no backups | ||
Details | Website | 2023-10-24 | 10 | Attacks on web applications spike in third quarter, new Talos IR data shows | ||
Details | Website | 2023-10-23 | 273 | Red Team Tools | ||
Details | Website | 2023-09-29 | 25 | The Thin Line: Educational Tools vs. Malicious Threats - A Focus on The-Murk-Stealer - CYFIRMA | ||
Details | Website | 2023-09-22 | 56 | Examining the Activities of the Turla APT Group | ||
Details | Website | 2023-09-22 | 57 | Examining the Activities of the Turla APT Group | ||
Details | Website | 2023-09-06 | 64 | Summer '23 Cryptomining Attacks: Analysis + Recommendations | Wiz Blog | ||
Details | Website | 2023-09-05 | 41 | Dark Web Profile: Medusa Ransomware (MedusaLocker) | ||
Details | Website | 2023-08-25 | 195 | Russia/Ukraine Update - August 2023 | ||
Details | Website | 2023-07-27 | 117 | Healthcare Threat Landscape 2022-2023: Common TTPs Used by Top Ransomware Groups Targeting the Healthcare Sector | ||
Details | Website | 2023-07-21 | 22 | Ransomware Spotlight: Play - Security News | ||
Details | Website | 2023-07-13 | 43 | Threat Actor Profile: BianLian, The Shape-Shifting Ransomware Group | ||
Details | Website | 2023-07-06 | 239 | Increased Truebot Activity Infects U.S. and Canada Based Networks | CISA | ||
Details | Website | 2023-06-14 | 23 | Understanding Ransomware Threat Actors: LockBit – Cyber Safe NV | ||
Details | Website | 2023-06-12 | 112 | A Truly Graceful Wipe Out - The DFIR Report | ||
Details | Website | 2023-05-16 | 77 | #StopRansomware: BianLian Ransomware Group | CISA | ||
Details | Website | 2023-04-25 | 54 | Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server | ||
Details | Website | 2023-04-20 | 481 | ATT&CK Changes | ||
Details | Website | 2023-04-10 | 86 | Threat Actor Spotlight: RagnarLocker Ransomware | ||
Details | Website | 2023-03-27 | 56 | Scarcruft Bolsters Arsenal for targeting individual Android devices | ||
Details | Website | 2023-03-23 | 78 | Earth Preta Updated Stealthy Strategies | ||
Details | Website | 2023-03-23 | 78 | Earth Preta Updated Stealthy Strategies |