T1646 Exfiltration Over C2 Channel
Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.
| Item | Value |
|---|---|
| ID | T1646 |
| Sub-techniques | |
| Tactics | TA0036 |
| Platforms | Android, iOS |
| Version | 1.1 |
| Created | 01 April 2022 |
| Last Modified | 24 October 2025 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| S1061 | AbstractEmu | AbstractEmu can send large amounts of device data over its C2 channel, including the device’s manufacturer, model, version and serial number, telephone number, and IP address.13 |
| S1095 | AhRat | AhRat can exfiltrate collected data to the C2, such as audio recordings and files.4 |
| S1215 | Binary Validator | Binary Validator has exfiltrated collected data to the C2 server.24 |
| S1079 | BOULDSPY | BOULDSPY has exfiltrated cached data from infected devices.14 |
| S1094 | BRATA | BRATA has exfiltrated data to the C2 server using HTTP requests.18 |
| C0033 | C0033 | During C0033, PROMETHIUM used StrongPity to exfiltrate to the C2 server using HTTPS.2928 |
| S1083 | Chameleon | Chameleon has sent stolen data over HTTP.7 |
| S1225 | CherryBlos | CherryBlos has exfiltrated credentials collected from pictures that have been analyzed using optical character recognition (OCR).20 |
| S1054 | Drinik | Drinik can send stolen data back to the C2 server.3 |
| S0507 | eSurv | eSurv has exfiltrated data using HTTP PUT requests.23 |
| S1080 | Fakecalls | Fakecalls can send exfiltrated data back to the C2 server.19 |
| S1067 | FluBot | FluBot can send contact lists to its C2 server.22 |
| S1093 | FlyTrap | FlyTrap can use HTTP to exfiltrate data to the C2 server.17 |
| S1231 | GodFather | GodFather has exfiltrated sensitive information over C2.1211 |
| S0551 | GoldenEagle | GoldenEagle has exfiltrated data via both SMTP and HTTP.1 |
| S0421 | GolfSpy | GolfSpy exfiltrates data using HTTP POST requests.6 |
| S1077 | Hornbill | Hornbill can exfiltrate data back to the C2 server using HTTP.15 |
| S1185 | LightSpy | LightSpy has exfiltrated collected data to the C2.10 |
| C0016 | Operation Dust Storm | During Operation Dust Storm, the threat actors used Android backdoors that would send information and data from a victim’s mobile device to the C2 servers.27 |
| S0399 | Pallas | Pallas exfiltrates data using HTTP.26 |
| S1241 | RatMilad | RatMilad has exfiltrated collected data to the C2.5 |
| S0326 | RedDrop | RedDrop uses standard HTTP for exfiltration.16 |
| S1055 | SharkBot | SharkBot can exfiltrate captured user credentials and event logs back to the C2 server. 2 |
| S1082 | Sunbird | Sunbird can exfiltrate compressed ZIP files containing gathered info to C2 infrastructure.15 |
| S0424 | Triada | Triada utilized HTTP to exfiltrate data through POST requests to the command and control server.21 |
| S0418 | ViceLeaker | ViceLeaker uses HTTP data exfiltration.89 |
| S0490 | XLoader for iOS | XLoader for iOS has exfiltrated data using HTTP requests.25 |
References
-
A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020. ↩
-
RIFT: Research and Intelligence Fusion Team. (2022, March 3). SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store. Retrieved January 18, 2023. ↩
-
Cyble. (2022, October 27). Drinik Malware Returns With Advanced Capabilities Targeting Indian Taxpayers. Retrieved November 17, 2024. ↩
-
Lukas Stefanko. (2023, May 23). Android app breaking bad: From legitimate screen recording to file exfiltration within a year. Retrieved December 18, 2023. ↩
-
Gupta, N. (2022, October 5). We Smell A RatMilad Android Spyware. Retrieved August 27, 2025. ↩
-
E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020. ↩
-
Cyble Research & Intelligence Labs. (2023, April 13). Banking Trojan targeting mobile users in Australia and Poland. Retrieved August 16, 2023. ↩
-
GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019. ↩
-
L. Arsene, C. Ochinca. (2018, August 20). Triout – Spyware Framework for Android with Extensive Surveillance Capabilities. Retrieved January 21, 2020. ↩
-
Dmitry Bestuzhev. (2025, April 7). The Coordinated Kill Switch: LightSpy’s iOS Destructive Plugin Architecture Manages Device Disablement. Retrieved April 14, 2025. ↩
-
Merkle Science. (2023, April 25). The Godfather Android Malware: Threat under the lens. Retrieved July 16, 2025. ↩
-
Ortega, F. Pratapagiri, V. (2025, June 18). Your Mobile App, Their Playground: The Dark Side of Virtualization. Retrieved July 16, 2025. ↩
-
P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023. ↩
-
Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023. ↩
-
Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023. ↩↩
-
Nell Campbell. (2018, February 27). RedDrop: the blackmailing mobile malware family lurking in app stores. Retrieved November 17, 2024. ↩
-
A. Yaswant. (2021, August 9). FlyTrap Android Malware Compromises Thousands of Facebook Accounts. Retrieved September 28, 2023. ↩
-
Federico Valentini, Francesco Lubatti. (2022, January 24). How BRATA is monitoring your bank account. Retrieved December 18, 2023. ↩
-
Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023. ↩
-
Trend Micro Research. (2023, July 28). Related CherryBlos and FakeTrade Android Malware Involved in Scam Campaigns. Retrieved March 28, 2025. ↩
-
Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019. ↩
-
Crista Giering, F. Naves, Andrew Conway, Adam McNeil . (2021, April 27). FluBot Android Malware Spreading Rapidly Through Europe, May Hit U.S. Soon. Retrieved February 28, 2023. ↩
-
A. Bauer. (2019, April 8). Lookout discovers phishing sites distributing new iOS and Android surveillanceware. Retrieved September 11, 2020. ↩
-
Kucherin, G., et al. (2023, October 23). The outstanding stealth of Operation Triangulation. Retrieved April 18, 2024. ↩
-
Hiroaki, H., Wu, L., Wu, L.. (2019, April 2). XLoader Disguises as Android Apps, Has FakeSpy Links. Retrieved July 20, 2020. ↩
-
Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018. ↩
-
Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021. ↩
-
Dong, Z. et al. (2021, July 21). StrongPity APT Group Deploys Android Malware for the First Time. Retrieved March 19, 2023. ↩
-
Stefanko, L. (2023, January 10). StrongPity espionage campaign targeting Android users. Retrieved January 31, 2023. ↩