EXPLORE
← Back to Explore
T1048.003

Exfiltration Over Unencrypted Non-C2 Protocol

Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.(Citation: copy_cmd_cisco) Adversaries may opt to obfuscate this data, without the use of encryption, within network protocols that are natively unencrypted (such as HTTP, FTP, or DNS). This may include custom or publicly available encoding/compression a...

ESXiLinuxmacOSNetwork DevicesWindows
20
Detections
3
Sources
11
Threat Actors

BY SOURCE

9splunk_escu8sigma3elastic

PROCEDURES (15)

Persist2 detections

Auto-extracted: 2 detections for persist

Encrypt2 detections

Auto-extracted: 2 detections for encrypt

Process Creation Monitoring2 detections

Auto-extracted: 2 detections for process creation monitoring

Unusual2 detections

Auto-extracted: 2 detections for unusual

Remote2 detections

Auto-extracted: 2 detections for remote

C21 detections

Auto-extracted: 1 detections for c2

Bypass1 detections

Auto-extracted: 1 detections for bypass

Http1 detections

Auto-extracted: 1 detections for http

Dns1 detections

Auto-extracted: 1 detections for dns

Network Connection Monitoring1 detections

Auto-extracted: 1 detections for network connection monitoring

Remote1 detections

Auto-extracted: 1 detections for remote

Bypass1 detections

Auto-extracted: 1 detections for bypass

Email Security1 detections

Auto-extracted: 1 detections for email security

Command And Control1 detections

Auto-extracted: 1 detections for command and control

C21 detections

Auto-extracted: 1 detections for c2

DETECTIONS (20)