Esc
Protocol or Service Impersonation - T1001.003
(ATT&CK® Technique)
Definition
Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thwart analysis efforts. By impersonating legitimate protocols or web services, adversaries can make their command and control traffic blend in with legitimate network traffic.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.