ID | Name |
---|---|
T1560.001 | Archive via Utility |
T1560.002 | Archive via Library |
T1560.003 | Archive via Custom Method |
An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party libraries. Many libraries exist that can archive data, including Python rarfile [1], libzip [2], and zlib [3]. Most libraries include functionality to encrypt and/or compress data.
Some archival libraries are preinstalled on systems, such as bzip2 on macOS and Linux, and zip on Windows. Note that the libraries are different from the utilities. The libraries can be linked against when compiling, while the utilities require spawning a subshell, or a similar execution mechanism.
ID | Name | Description |
---|---|---|
S0642 | BADFLICK |
BADFLICK has compressed data using the aPLib compression library.[4] |
S0127 | BBSRAT |
BBSRAT can compress data with ZLIB prior to sending it back to the C2 server.[5] |
S0348 | Cardinal RAT |
Cardinal RAT applies compression to C2 traffic using the ZLIB library.[6] |
S0354 | Denis | |
S0091 | Epic |
Epic compresses the collected data with bzip2 before sending it to the C2 server.[8] |
S0661 | FoggyWeb |
FoggyWeb can invoke the |
S0666 | Gelsemium |
Gelsemium can compress embedded executables with the zlib library.[10] |
S0260 | InvisiMole |
InvisiMole can use zlib to compress and decompress data.[11][12] |
G0032 | Lazarus Group |
Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib, encrypted, and uploaded to a C2 server.[13][14] |
S0053 | SeaDuke |
SeaDuke compressed data with zlib prior to sending it over C2.[15] |
S0467 | TajMahal |
TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.[16] |
G0027 | Threat Group-3390 |
Threat Group-3390 has used RAR to compress, encrypt, and password-protect files prior to exfiltration.[17] |
S0086 | ZLib |
The ZLib backdoor compresses communications using the standard Zlib compression library.[18] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component |
---|---|---|
DS0022 | File | File Creation |
DS0012 | Script | Script Execution |
Monitor processes for accesses to known archival libraries. This may yield a significant number of benign events, depending on how systems in the environment are typically used.
Consider detecting writing of files with extensions and/or headers associated with compressed or encrypted file types. Detection efforts may focus on follow-on exfiltration activity, where compressed or encrypted files can be detected in transit with a network intrusion detection or data loss prevention system analyzing file headers.[19]