Threat actors may create custom protocols to thwart security controls from reading/interpreting the data in transit.

Common types

  • TCP
  • Traffic over port 443 that is not HTTPS

Malware/Threat actors

Preventions

<Mitigation techniques>

Detections

During the encryption handshake in protocols like TLS, SSL, and SSH look for encryption suites and ciphers that are new to the environment.

Toolkit

<Toolkit instructions, if applicable>