EXPLORE
← Back to Explore
T1048.002

Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

Adversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Asymmetric encryption algorithms are those that use different keys on each end of the channel. Also known as public-key cryptography, this requires pairs of cryptographic keys that can encrypt/decrypt data from the corresponding key. Each e...

LinuxmacOSWindowsESXi
0
Detections
0
Sources
3
Threat Actors

THREAT ACTORS (3)

DETECTIONS (0)