T1102.002 - Bidirectional Communication
Sub-technique
Tattiche:
Command and Control
Command and Control
Piattaforme:
Linux macOS Windows ESXi
Linux macOS Windows ESXi
Rilevamento:
Not specified
Not specified
Description:
Adversaries may use an existing, legitimate external Web service as a means for sending commands to and receiving output from a compromised system over the Web service channel. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems can then send the output from those commands back over that Web service channel. The return traffic may occur in a variety of ways, depending on the Web service being utilized. For example, the return traffic may take the form of the compromised system posting a comment on a forum, issuing a pull request to development project, updating a document hosted on a Web service, or by sending a Tweet.
Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.
Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.
Usato da Attori (16)
APT12
Nation-state
Nation-state
APT28
Nation-state
Nation-state
Turla
Nation-state
Nation-state
FIN7
Criminal
Criminal
Lazarus Group
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
Kimsuky
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
APT37
Nation-state
Nation-state
APT39
Unknown
Unknown
POLONIUM
Nation-state
Nation-state
Sandworm Team
Unknown
Unknown
HEXANE
Unknown
Unknown
Magic Hound
Unknown
Unknown
ZIRCONIUM
Unknown
Unknown
Carbanak
Unknown
Unknown
Malware (20)
Metadata
| MITRE ID: | T1102.002 |
| STIX ID: | attack-pattern--be055942-6e63-... |
| Piattaforme: | Linux, macOS, Windows, ESXi |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |