← Back to Explore
T1008
Fallback Channels
Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.
LinuxWindowsmacOSESXi
5
Detections
2
Sources
5
Threat Actors
BY SOURCE
4sigma1splunk_escu
PROCEDURES (2)
Registry Monitoring3 detections
Auto-extracted: 3 detections for registry monitoring
File Monitoring2 detections
Auto-extracted: 2 detections for file monitoring