Command and Control

T1102.003: One-Way Communication

Adversaries may use an existing, legitimate external Web service as a means for sending commands to a compromised system without receiving return output over the Web service channel. Compromised syste...

T1102.003 · Sub-technique ·4 platforms ·2 groups

Description

Adversaries may use an existing, legitimate external Web service as a means for sending commands to a compromised system without receiving return output over the Web service channel. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service. Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response.

Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.

Platforms

LinuxmacOSWindowsESXi

Mitigations (2)

Restrict Web-Based ContentM1021

Web proxies can be used to enforce external network communication policy that prevents use of unauthorized external services.

Network Intrusion PreventionM1031

Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.

Threat Groups (2)

IDGroupContext
G0065Leviathan[Leviathan](https://attack.mitre.org/groups/G0065) has received C2 instructions from user profiles created on legitimate websites such as Github and T...
G0047Gamaredon Group[Gamaredon Group](https://attack.mitre.org/groups/G0047) has used Telegram Messenger content to discover the IP address for C2 communications.(Citatio...

Associated Software (6)

IDNameTypeContext
S0568EVILNUMMalware[EVILNUM](https://attack.mitre.org/software/S0568) has used a one-way communication method via GitLab and Digital Point to perform C2.(Citation: Preva...
S1210SagerunexMalware[Sagerunex](https://attack.mitre.org/software/S1210) has used web services such as Twitter for command and control purposes.(Citation: Cisco LotusBlos...
S0455MetamorfoMalware[Metamorfo](https://attack.mitre.org/software/S0455) has downloaded a zip file for execution on the system.(Citation: Medium Metamorfo Apr 2020)(Citat...
S0052OnionDukeMalware[OnionDuke](https://attack.mitre.org/software/S0052) uses Twitter as a backup C2.(Citation: F-Secure The Dukes)
S1164UPSTYLEMalware[UPSTYLE](https://attack.mitre.org/software/S1164) parses encoded commands from error logs after attempting to resolve a non-existing webpage from the...
S0037HAMMERTOSSMalwareThe "tDiscoverer" variant of [HAMMERTOSS](https://attack.mitre.org/software/S0037) establishes a C2 channel by downloading resources from Web services...

References

Frequently Asked Questions

What is T1102.003 (One-Way Communication)?

T1102.003 is a MITRE ATT&CK technique named 'One-Way Communication'. It belongs to the Command and Control tactic(s). Adversaries may use an existing, legitimate external Web service as a means for sending commands to a compromised system without receiving return output over the Web service channel. Compromised syste...

How can T1102.003 be detected?

Detection of T1102.003 (One-Way Communication) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.

What mitigations exist for T1102.003?

There are 2 documented mitigations for T1102.003. Key mitigations include: Restrict Web-Based Content, Network Intrusion Prevention.

Which threat groups use T1102.003?

Known threat groups using T1102.003 include: Leviathan, Gamaredon Group.