Esc
Encrypted Channel - T1573
(ATT&CK® Technique)
Definition
Adversaries may employ an encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generated within malware samples/configuration files.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.