This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Standard Application Layer Protocol
Jump to navigation
Jump to search
To visit this technique’s new page please go to and update your links to https://attack.mitre.org/techniques/T0869
Standard Application Layer Protocol | |
---|---|
Technique | |
ID | T0869 |
Tactic | Command and Control |
Data Sources | Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content |
Asset | Human-Machine Interface, Control Server, Data Historian, Engineering Workstation |
Description
Adversaries may establish command and control capabilities over commonly used application layer protocols such as HTTP(S), OPC, RDP, telnet, DNP3, and modbus. These protocols may be used to disguise adversary actions as benign network traffic. Standard protocols may be seen on their associated port or in some cases over a non-standard port.
Adversaries may use these protocols to reach out of the network for command and control, or in some cases to other infected devices within the network.
Procedure Examples
- HEXANE communicated with command and control over HTTP and DNS.1
- OilRig communicated with its command and control using HTTP requests.2
- BlackEnergy uses HTTP POST request to contact external command and control servers.3
- REvil sends HTTPS POST messages with randomly generated URLs to communicate with a remote server.45
- Stuxnet uses a thread to monitor a data block DB890 of sequence A or B. This thread is constantly running and probing this block (every 5 minutes). On an infected PLC, if block DB890 is found and contains a special magic value (used by Stuxnet to identify his own block DB890), this block’s data can be read and written. This thread is likely used to optimize the way sequences A and B work, and modify their behavior when the Step7 editor is opened.6
- Triton can communicate with the implant utilizing the TriStation 'get main processor diagnostic data' command and looks for a specifically crafted packet body from which it extracts a command value and its arguments.7
Mitigations
- Network Allowlists - Network allowlists can be implemented through either host-based files or system host files to specify what external connections (e.g., IP address, MAC address, port, protocol) can be made from a device. Allowlist techniques that operate at the application layer (e.g., DNP3, Modbus, HTTP) are addressed in the Filter Network Traffic mitigation.
- Network Intrusion Prevention - Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
- Network Segmentation - Ensure proper network segmentation between higher level corporate resources and the control process environment.
References
- ^ Dragos. (n.d.). Hexane. Retrieved October 27, 2019.
- ^ Robert Falcone, Bryan Lee. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved November 19, 2019.
- ^ Booz Allen Hamilton. (n.d.). When The Lights Went Out. Retrieved October 22, 2019.
- ^ Tom Fakterman. (2019, August 05). Sodinokibi: The Crown Prince of Ransomware. Retrieved April 12, 2021.
- ^ SecureWorks. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved April 12, 2021.
- ^ Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017.
- ^ Jos Wetzels. (2018, January 16). Analyzing the TRITON industrial malware. Retrieved October 22, 2019.
|