Esc  
     
 
   
 
 
   
 
There are no digital artifacts defined on this offensive technique (yet). Please consider contributing an addition to D3FEND. 
  
   
 Standard Cryptographic Protocol - T1032
(ATT&CK® Technique)
  Definition
Adversaries may explicitly employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if necessary secret keys are encoded and/or generated within malware samples/configuration files.
D3FEND Inferred Relationships
There are no digital artifacts defined on this offensive technique (yet). Please consider contributing an addition to D3FEND.