Threat actors may create custom obfuscation(encryption, encoding, and hashing) mechanisms to thwart defenders.

Common types

  • encryption
  • obfuscation
  • compression

Malware/Threat actors

Preventions

<Mitigation techniques>

Detections

During the encryption handshake in protocols like TLS, SSL, and SSH look for encryption suites and ciphers that are new to the environment.

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References