Common Information
Type Value
Value
File Transfer Protocols - T1071.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may communicate using application layer protocols associated with transferring files to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. Protocols such as SMB(Citation: US-CERT TA18-074A), FTP(Citation: ESET Machete July 2019), FTPS, and TFTP that transfer files may be very common in environments. Packets produced from these protocols may have many fields and headers in which data can be concealed. Data could also be concealed within the transferred files. An adversary may abuse these protocols to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.
Details Published Attributes CTI Title
Details Website 2022-09-10 22 File Transfer Protocol - Wikipedia
Details Website 2022-06-07 18 Rclone Wars: Transferring leverage in a ransomware attack
Details Website 2022-01-01 288 Shadowpad/technical-indicators at main · SentineLabs/Shadowpad
Details Website 2021-12-02 95 SideCopy APT: Connecting lures to victims, payloads to infrastructure
Details Website 2021-06-28 22 Nefilim Ransomware Attack Through a MITRE Att&ck Lens
Details Website 2021-02-04 25 Connecting the dots inside the Italian APT Landscape - Yoroi
Details Website 2020-10-01 85 Potential for China Cyber Response to Heightened U.S.–China Tensions | CISA
Details Website 2020-09-02 63 KryptoCibule: The multitasking multicurrency cryptostealer | WeLiveSecurity
Details Website 2019-03-06 6 PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services - Check Point Research
Details Website 2017-01-22 0 Russian Hacker behind 'NeverQuest' Malware, Wanted by FBI, Is Arrested in Spain
Details Website 2015-08-17 0 IBM, Aspera Transfer Network Lessons to Wider Markets