加密通道

加密通道是指攻击者使用密码学手段对通信内容进行加密,以保护命令控制(C2)流量免受窃听或分析的网络对抗技术。传统加密通道通常采用固定加密算法与静态密钥,通过与目标系统建立加密会话实现数据隐蔽传输。防御方可通过SSL/TLS解密、流量特征分析、异常协议检测等手段识别潜在恶意加密通信,例如检测不符合协议规范的加密握手过程、识别非常用端口上的加密流量或分析通信模式的时序异常。

当前加密通道匿迹技术的核心演进方向聚焦于加密体系动态化、协议行为拟真化与传输架构去中心化三大维度。动态密钥轮换技术通过密码学参数的持续更新破坏静态特征提取,使得传统基于特征签名的检测方法失效;协议模拟加密隧道在协议栈各层级精确复制合法应用行为,规避深度包检测设备的协议合规性审查;分布式代理链传输则通过多节点加密中继与动态路由机制,将通信特征分散至多个网络空间维度。三类技术的共性在于突破传统加密通道的"端到端"静态模型,构建具备环境自适应能力的弹性加密体系,通过密码学、协议工程与网络拓扑的协同创新,实现加密流量在协议合规性、行为合法性和拓扑隐蔽性层面的全面伪装。

ID: T1573
Sub-techniques:  T1573.001, T1573.002, T1573.003
Tactic: 命令控制
Platforms: Linux, Network, Windows, macOS
Version: 1.1
Created: 16 March 2020
Last Modified: 16 April 2024

匿迹效应

效应类型 是否存在
特征伪装
行为透明
数据遮蔽
时空释痕

特征伪装

攻击者通过协议栈深度模拟技术,使加密通道在协议头结构、握手流程、数据封装等层面与合法加密应用(如HTTPS、SSH)完全一致。部分高级实现还能动态适配目标网络的主流协议类型,使得加密流量在协议解析层面无法与正常业务流量区分,实现通信特征的深度伪装。

数据遮蔽

采用符合行业标准的强加密算法(如AES-256、ChaCha20)对通信内容进行端到端加密,结合前向安全设计确保历史通信无法被破解。部分技术引入多层加密机制,在传输过程中对数据进行反复加密,使得任何单层解密都无法获取有效信息,实现数据内容的彻底遮蔽。

时空释痕

通过分布式代理链构建动态传输路径,将单一通信会话分散到多个地理节点与时间片段。利用云基础设施的弹性扩展特性,动态创建和销毁代理节点,使得加密通道的拓扑结构持续变化。这种时空维度上的动态分散策略,将通信特征稀释在广域网络空间与长时间运行过程中,传统基于单点采集的检测系统难以实施有效关联分析。

Procedure Examples

ID Name Description
G0016 APT29

APT29 has used multiple layers of encryption within malware to protect C2 communication.[1]

G1002 BITTER

BITTER has encrypted their C2 communications.[2]

S0631 Chaes

Chaes has used encryption for its C2 channel.[3]

S0498 Cryptoistic

Cryptoistic can engage in encrypted communications with C2.[4]

S0367 Emotet

Emotet has encrypted data before sending to the C2 server.[5]

S0032 gh0st RAT

gh0st RAT has encrypted TCP communications to evade detection.[6]

C0035 KV Botnet Activity

KV Botnet Activity command and control activity includes transmission of an RSA public key in communication from the server, but this is followed by subsequent negotiation stages that represent a form of handshake similar to TLS negotiation.[7]

S0681 Lizar

Lizar can support encrypted communications between the client and server.[8][9]

S1016 MacMa

MacMa has used TLS encryption to initialize a custom protocol for C2 communications.[10]

G0059 Magic Hound

Magic Hound has used an encrypted http proxy in C2 communications.[11]

S0198 NETWIRE

NETWIRE can encrypt C2 communications.[12]

S1012 PowerLess

PowerLess can use an encrypted channel for C2 communications.[13]

S1046 PowGoop

PowGoop can receive encrypted commands from C2.[14]

S0662 RCSession

RCSession can use an encrypted beacon to check in with C2.[15]

C0030 Triton Safety Instrumented System Attack

In the Triton Safety Instrumented System Attack, TEMP.Veles used cryptcat binaries to encrypt their traffic.[16]

G0081 Tropic Trooper

Tropic Trooper has encrypted traffic with the C2 to prevent network detection.[17]

Mitigations

ID Mitigation Description
M1031 Network Intrusion Prevention

Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.

M1020 SSL/TLS Inspection

SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols.

Detection

ID Data Source Data Component Detects
DS0029 Network Traffic Network Traffic Content

Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)).

References