Adversaries may explicitly employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if necessary secret keys are encoded and/or generated within malware samples/configuration files.
ID | Name | Description |
---|---|---|
S0529 | CarbonSteal |
CarbonSteal has performed rudimentary SSL certificate validation to verify C2 server authenticity before establishing a SSL connection.[1] |
S0555 | CHEMISTGAMES |
CHEMISTGAMES has used HTTPS for C2 communication.[2] |
S0507 | eSurv |
eSurv’s Android version has used public key encryption and certificate pinning for C2 communication.[3] |
S0478 | EventBot |
EventBot has encrypted base64-encoded payload data using RC4 and Curve25519.[4] |
S0411 | Rotexy | |
S0549 | SilkBean | |
S0302 | Twitoor | |
G0112 | Windshift |
Windshift has encrypted C2 communications using AES in CBC mode during Operation BULL and Operation ROCK.[7] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is undetectable to the user.