T1573
Encrypted Channel
暗号化されたチャネル

Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generated within malware samples/configuration files.

攻撃者は、通信プロトコルが備える保護に依存するのではなく、コマンドや制御トラフィックを隠すために既知の暗号化アルゴリズムを使用することがあります。安全なアルゴリズムを使用したにもかかわらず、秘密鍵がマルウェアのサンプル/設定ファイル内で暗号化/生成された場合、これらの実装はリバースエンジニアリングで解読されることがあります。

ID: T1573
Sub-techniques:  T1573.001, T1573.002
Platforms: Linux, Windows, macOS
Version: 1.0
Created: 16 March 2020
Last Modified: 20 April 2021

Procedure Examples

ID Name Description
G0016 APT29

APT29 has used multiple layers of encryption within malware to protect C2 communication.[1]

G1002 BITTER

BITTER has encrypted their C2 communications.[2]

S0631 Chaes

Chaes has used encryption for its C2 channel.[3]

S0498 Cryptoistic

Cryptoistic can engage in encrypted communications with C2.[4]

S0032 gh0st RAT

gh0st RAT has encrypted TCP communications to evade detection.[5]

S0681 Lizar

Lizar can support encrypted communications between the client and server.[6][7]

S1016 MacMa

MacMa has used TLS encryption to initialize a custom protocol for C2 communications.[8]

S0198 NETWIRE

NETWIRE can encrypt C2 communications.[9]

S1012 PowerLess

PowerLess can use an encrypted channel for C2 communications.[10]

S1046 PowGoop

PowGoop can receive encrypted commands from C2.[11]

S0662 RCSession

RCSession can use an encrypted beacon to check in with C2.[12]

G0081 Tropic Trooper

Tropic Trooper has encrypted traffic with the C2 to prevent network detection.[13]

Mitigations

ID Mitigation Description
M1031 Network Intrusion Prevention

Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.

M1020 SSL/TLS Inspection

SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols.

Detection

ID Data Source Data Component Detects
DS0029 Network Traffic Network Traffic Content

Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)).

References