Command and Control

T1573: Encrypted Channel

Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure...

T1573 · Technique ·5 platforms ·4 groups

Description

Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generated within malware samples/configuration files.

Platforms

ESXiLinuxmacOSNetwork DevicesWindows

Sub-Techniques (2)

Mitigations (2)

Network Intrusion PreventionM1031

Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.

SSL/TLS InspectionM1020

SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols.

Threat Groups (4)

IDGroupContext
G0081Tropic Trooper[Tropic Trooper](https://attack.mitre.org/groups/G0081) has encrypted traffic with the C2 to prevent network detection.(Citation: TrendMicro Tropic Tr...
G0059Magic Hound[Magic Hound](https://attack.mitre.org/groups/G0059) has used an encrypted http proxy in C2 communications.(Citation: DFIR Phosphorus November 2021)
G1002BITTER[BITTER](https://attack.mitre.org/groups/G1002) has encrypted their C2 communications.(Citation: Forcepoint BITTER Pakistan Oct 2016)
G0016APT29[APT29](https://attack.mitre.org/groups/G0016) has used multiple layers of encryption within malware to protect C2 communication.(Citation: Securework...

Associated Software (11)

IDNameTypeContext
S0662RCSessionMalware[RCSession](https://attack.mitre.org/software/S0662) can use an encrypted beacon to check in with C2.(Citation: Secureworks BRONZE PRESIDENT December ...
S0498CryptoisticMalware[Cryptoistic](https://attack.mitre.org/software/S0498) can engage in encrypted communications with C2.(Citation: SentinelOne Lazarus macOS July 2020)
S1198GomirMalware[Gomir](https://attack.mitre.org/software/S1198) uses a custom encryption algorithm for content sent to command and control infrastructure.(Citation: ...
S0631ChaesMalware[Chaes](https://attack.mitre.org/software/S0631) has used encryption for its C2 channel.(Citation: Cybereason Chaes Nov 2020)
S1046PowGoopMalware[PowGoop](https://attack.mitre.org/software/S1046) can receive encrypted commands from C2.(Citation: DHS CISA AA22-055A MuddyWater February 2022)
S1012PowerLessMalware[PowerLess](https://attack.mitre.org/software/S1012) can use an encrypted channel for C2 communications.(Citation: Cybereason PowerLess February 2022)
S0681LizarMalware[Lizar](https://attack.mitre.org/software/S0681) can support encrypted communications between the client and server.(Citation: Threatpost Lizar May 20...
S0032gh0st RATMalware[gh0st RAT](https://attack.mitre.org/software/S0032) has encrypted TCP communications to evade detection.(Citation: Gh0stRAT ATT March 2019)
S0198NETWIREMalware[NETWIRE](https://attack.mitre.org/software/S0198) can encrypt C2 communications.(Citation: Red Canary NETWIRE January 2020)
S1016MacMaMalware[MacMa](https://attack.mitre.org/software/S1016) has used TLS encryption to initialize a custom protocol for C2 communications.(Citation: ESET DazzleS...
S0367EmotetMalware[Emotet](https://attack.mitre.org/software/S0367) has encrypted data before sending to the C2 server.(Citation: Fortinet Emotet May 2017)

References

Frequently Asked Questions

What is T1573 (Encrypted Channel)?

T1573 is a MITRE ATT&CK technique named 'Encrypted Channel'. It belongs to the Command and Control tactic(s). Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure...

How can T1573 be detected?

Detection of T1573 (Encrypted Channel) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.

What mitigations exist for T1573?

There are 2 documented mitigations for T1573. Key mitigations include: Network Intrusion Prevention, SSL/TLS Inspection.

Which threat groups use T1573?

Known threat groups using T1573 include: Tropic Trooper, Magic Hound, BITTER, APT29.