Logo CTI Cyber Threat Intel
  • Dashboard
  • Threat Actors
  • Ransomware
  • Malware
  • ATT&CK
  • Search
  • Main Site
  • IT EN
  1. Dashboard
  2. ATT&CK
  3. T1041 - Exfiltration Over C2 Channel
View on MITRE ATT&CK

T1041 - Exfiltration Over C2 Channel

Tactics:
Exfiltration
Platforms:
ESXi Linux macOS Windows
Detection:
Not specified
Description:
Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.
Used by Actors (20)
APT3
Nation-state
Lazarus Group
Nation-state
Stealth Falcon
Nation-state
Gamaredon Group
Unknown
APT32
Nation-state
Kimsuky
Nation-state
MuddyWater
Nation-state
MUSTANG PANDA
Nation-state
WIZARD SPIDER
Nation-state
APT39
Unknown
Higaisa
Nation-state
GALLIUM
Unknown
Scattered Spider
Unknown
Winter Vivern
Unknown
LuminousMoth
Unknown
Sandworm Team
Unknown
Ke3chang
Unknown
Leviathan
Unknown
Chimera
Unknown
CURIUM
Unknown
Malware (20)
TrickBot other BLINDINGCAN other Pikabot other Spark other Bumblebee other Amadey other Proxysvc other Torisma other Stuxnet other RotaJakiro other KOPILUWAK other Misdat other HAWKBALL other Ursnif other ZLib other InvisibleFerret other Bankshot other SharpDisco other StrongPity other AppleSeed other
Metadata
MITRE ID: T1041
STIX ID: attack-pattern--92d7da27-2d91-...
Platforms: ESXi, Linux, macOS, Windows
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00
> Cyber Threat Intelligence

Cyber Threat Intelligence portal powered by OSINT sources

MITRE ATT&CK
MISP | Malpedia

> Data Sources
  • MITRE ATT&CK
  • MISP Project
  • Malpedia
  • Main Site
> Dashboard
  • Threat Actors
  • Ransomware
  • Malware
  • ATT&CK

Data is provided for informational purposes. Use responsibly.

> © 2026 Giovanni Carrieri