Critical Infrastructure Cybersecurity Framework
T1048Exfiltration2 Mitigations

Exfiltration Over Alternative Protocol

Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel.

Description

Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Data Loss PreventionFilter Network Traffic

Quick Info

Technique ID
T1048
Sub-Techniques
3
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.