EXPLORE
← Back to Explore
T1008

Fallback Channels

Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.

LinuxWindowsmacOSESXi
5
Detections
2
Sources
5
Threat Actors

BY SOURCE

4sigma1splunk_escu

PROCEDURES (2)

Registry Monitoring3 detections

Auto-extracted: 3 detections for registry monitoring

File Monitoring2 detections

Auto-extracted: 2 detections for file monitoring

DETECTIONS (5)