Exfiltration Over Alternative Protocol
Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel.
Description
Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Data Loss PreventionFilter Network Traffic
Quick Info
- Technique ID
- T1048
- Tactic
- Exfiltration
- Sub-Techniques
- 3
- Mitigations
- 2
