Exfiltration

T1041: Exfiltration Over C2 Channel

Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control...

T1041 · Technique ·4 platforms ·27 groups

Description

Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.

Platforms

ESXiLinuxmacOSWindows

Mitigations (2)

Network Intrusion PreventionM1031

Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level. Signatures are often for unique indicators within protocols and may be based on the specific obfuscation technique used by a particular adversary or tool, and will likely be different across various malware families

Data Loss PreventionM1057

Data loss prevention can detect and block sensitive data being sent over unencrypted protocols.

Threat Groups (27)

IDGroupContext
G1015Scattered Spider[Scattered Spider](https://attack.mitre.org/groups/G1015) has exfiltrated data from compromised VMware vCenter servers through an established C2 chann...
G1014LuminousMoth[LuminousMoth](https://attack.mitre.org/groups/G1014) has used malware that exfiltrates stolen data to its C2 server.(Citation: Kaspersky LuminousMoth...
G0034Sandworm Team[Sandworm Team](https://attack.mitre.org/groups/G0034) has sent system information to its C2 server using HTTP.(Citation: ESET Telebots Dec 2016)
G0114Chimera[Chimera](https://attack.mitre.org/groups/G0114) has used [Cobalt Strike](https://attack.mitre.org/software/S0154) C2 beacons for data exfiltration.(C...
G0093GALLIUM[GALLIUM](https://attack.mitre.org/groups/G0093) used Web shells and [HTRAN](https://attack.mitre.org/software/S0040) for C2 and to exfiltrate data.(C...
G0126Higaisa[Higaisa](https://attack.mitre.org/groups/G0126) exfiltrated data over its C2 channel.(Citation: Zscaler Higaisa 2020)
G0004Ke3chang[Ke3chang](https://attack.mitre.org/groups/G0004) transferred compressed and encrypted RAR files containing exfiltration through the established backd...
G0087APT39[APT39](https://attack.mitre.org/groups/G0087) has exfiltrated stolen victim data through C2 communications.(Citation: FBI FLASH APT39 September 2020)
G0032Lazarus Group[Lazarus Group](https://attack.mitre.org/groups/G0032) has exfiltrated data and files over a C2 channel through its various tools and malware.(Citatio...
G0129Mustang Panda[Mustang Panda](https://attack.mitre.org/groups/G0129) has exfiltrated stolen data and files to its C2 server.(Citation: Cisco Talos MUSTANG PANDA PLU...
G0022APT3[APT3](https://attack.mitre.org/groups/G0022) has a tool that exfiltrates data over the C2 channel.(Citation: FireEye Clandestine Fox)
G0050APT32[APT32](https://attack.mitre.org/groups/G0050)'s backdoor has exfiltrated data using the already opened channel with its C&C server.(Citation: ESET Oc...
G1052Contagious Interview[Contagious Interview](https://attack.mitre.org/groups/G1052) has exfiltrated data from a compromised host to actor-controlled C2 servers.(Citation: S...
G0090WIRTE[WIRTE](https://attack.mitre.org/groups/G0090) has exfiltrated collected victim data to C2 infrastructure.(Citation: Palo Alto Ashen Lepus DEC 2025)
G0094Kimsuky[Kimsuky](https://attack.mitre.org/groups/G0094) has exfiltrated data over its C2 channel.(Citation: Securelist Kimsuky Sept 2013)(Citation: Talos Kim...
G0128ZIRCONIUM[ZIRCONIUM](https://attack.mitre.org/groups/G0128) has exfiltrated files via the Dropbox API C2.(Citation: Zscaler APT31 Covid-19 October 2020)
G1043BlackByte[BlackByte](https://attack.mitre.org/groups/G1043) transmitted collected victim host information via HTTP POST to command and control infrastructure.(...
G0142Confucius[Confucius](https://attack.mitre.org/groups/G0142) has exfiltrated stolen files to its C2 server.(Citation: TrendMicro Confucius APT Aug 2021)
G1035Winter Vivern[Winter Vivern](https://attack.mitre.org/groups/G1035) delivered a PowerShell script capable of recursively scanning victim machines looking for vario...
G0102Wizard Spider[Wizard Spider](https://attack.mitre.org/groups/G0102) has exfiltrated domain credentials and network enumeration information over command and control...

Associated Software (164)

IDNameTypeContext
S1172OilBoosterMalware[OilBooster](https://attack.mitre.org/software/S1172) can use an actor-controlled OneDrive account for C2 communication and exfiltration.(Citation: ES...
S0459MechaFlounderMalware[MechaFlounder](https://attack.mitre.org/software/S0459) has the ability to send the compromised user's account name and hostname within a URL to C2.(...
S9035LAMEHUGMalware[LAMEHUG](https://attack.mitre.org/software/S9035) can exfiltrate collected system information and documents to C2.(Citation: Splunk LAMEHUG SEP 2025)...
S0428PoetRATMalware[PoetRAT](https://attack.mitre.org/software/S0428) has exfiltrated data over the C2 channel.(Citation: Talos PoetRAT October 2020)
S0445ShimRatReporterTool[ShimRatReporter](https://attack.mitre.org/software/S0445) sent generated reports to the C2 via HTTP POST requests.(Citation: FOX-IT May 2016 Mofang)
S1019SharkMalware[Shark](https://attack.mitre.org/software/S1019) has the ability to upload files from the compromised host over a DNS or HTTP C2 channel.(Citation: Cl...
S1210SagerunexMalware[Sagerunex](https://attack.mitre.org/software/S1210) encrypts collected system data then exfiltrates via existing command and control channels.(Citati...
S0533SLOTHFULMEDIAMalware[SLOTHFULMEDIA](https://attack.mitre.org/software/S0533) has sent system information to a C2 server via HTTP and HTTPS POST requests.(Citation: CISA M...
S1183StrelaStealerMalware[StrelaStealer](https://attack.mitre.org/software/S1183) exfiltrates collected email credentials via HTTP POST to command and control servers.(Citatio...
S1017OutSteelMalware[OutSteel](https://attack.mitre.org/software/S1017) can upload files from a compromised host over its C2 channel.(Citation: Palo Alto Unit 42 OutSteel...
S1246BeaverTailMalware[BeaverTail](https://attack.mitre.org/software/S1246) has exfiltrated data collected from victim devices to C2 servers.(Citation: Socket BeaverTail XO...
S0234BandookMalware[Bandook](https://attack.mitre.org/software/S0234) can upload files from a victim's machine over the C2 channel.(Citation: CheckPoint Bandook Nov 2020...
S9015BRICKSTORMMalware[BRICKSTORM](https://attack.mitre.org/software/S9015) has uploaded files from the victim system to C2 servers.(Citation: CrowdStrike BRICKSTORM WARP P...
S0431HotCroissantMalware[HotCroissant](https://attack.mitre.org/software/S0431) has the ability to download files from the infected host to the command and control (C2) serve...
S1021DnsSystemMalware[DnsSystem](https://attack.mitre.org/software/S1021) can exfiltrate collected data to its C2 server.(Citation: Zscaler Lyceum DnsSystem June 2022)
S0409MacheteMalware[Machete](https://attack.mitre.org/software/S0409)'s collected data is exfiltrated over the same channel used for C2.(Citation: ESET Machete July 2019...
S1039BumblebeeMalware[Bumblebee](https://attack.mitre.org/software/S1039) can send collected data in JSON format to C2.(Citation: Google EXOTIC LILY March 2022)
S0584AppleJeusMalware[AppleJeus](https://attack.mitre.org/software/S0584) has exfiltrated collected host information to a C2 server.(Citation: CISA AppleJeus Feb 2021)
S1090NightClubMalware[NightClub](https://attack.mitre.org/software/S1090) can use SMTP and DNS for file exfiltration and C2.(Citation: MoustachedBouncer ESET August 2023)
S1188Line RunnerMalware[Line Runner](https://attack.mitre.org/software/S1188) utilizes HTTP to retrieve and exfiltrate information staged using [Line Dancer](https://attack....

References

Frequently Asked Questions

What is T1041 (Exfiltration Over C2 Channel)?

T1041 is a MITRE ATT&CK technique named 'Exfiltration Over C2 Channel'. It belongs to the Exfiltration tactic(s). Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control...

How can T1041 be detected?

Detection of T1041 (Exfiltration Over C2 Channel) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.

What mitigations exist for T1041?

There are 2 documented mitigations for T1041. Key mitigations include: Network Intrusion Prevention, Data Loss Prevention.

Which threat groups use T1041?

Known threat groups using T1041 include: Scattered Spider, LuminousMoth, Sandworm Team, Chimera, GALLIUM, Higaisa, Ke3chang, APT39.