MITRE ATT&CK Technique
Command and Control T1102
Description

Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites, cloud services, and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google, Microsoft, or Twitter, makes it easier for adversaries to hide in expected noise.(Citation: Broadcom BirdyClient Microsoft Graph API 2024) Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed).

Supported Platforms
ESXi Linux Windows macOS
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2017-05-31T21:31:13.915Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may use an existing, legitimate external Web '
                'service as a means for relaying data to/from a compromised '
                'system. Popular websites, cloud services, and social media '
                'acting as a mechanism for C2 may give a significant amount of '
                'cover due to the likelihood that hosts within a network are '
                'already communicating with them prior to a compromise. Using '
                'common services, such as those offered by Google, Microsoft, '
                'or Twitter, makes it easier for adversaries to hide in '
                'expected noise.(Citation: Broadcom BirdyClient Microsoft '
                'Graph API 2024) Web service providers commonly use SSL/TLS '
                'encryption, giving adversaries an added level of protection.\n'
                '\n'
                'Use of Web services may also protect back-end C2 '
                'infrastructure from discovery through malware binary analysis '
                'while also enabling operational resiliency (since this '
                'infrastructure may be dynamically changed).',
 'external_references': [{'external_id': 'T1102',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1102'},
                         {'description': 'Broadcom. (2024, May 2). BirdyClient '
                                         'malware leverages Microsoft Graph '
                                         'API for C&C communication. Retrieved '
                                         'July 1, 2024.',
                          'source_name': 'Broadcom BirdyClient Microsoft Graph '
                                         'API 2024',
                          'url': 'https://www.broadcom.com/support/security-center/protection-bulletin/birdyclient-malware-leverages-microsoft-graph-api-for-c-c-communication'},
                         {'description': 'Gardiner, J.,  Cova, M., Nagaraja, '
                                         'S. (2014, February). Command & '
                                         'Control Understanding, Denying and '
                                         'Detecting. Retrieved April 20, 2016.',
                          'source_name': 'University of Birmingham C2',
                          'url': 'https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf'}],
 'id': 'attack-pattern--830c9528-df21-472c-8c14-a036bf17d665',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'command-and-control'}],
 'modified': '2025-10-24T17:49:02.831Z',
 'name': 'Web Service',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Anastasios Pingios',
                          'Sarathkumar Rajendran, Microsoft Defender365'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': False,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['ESXi', 'Linux', 'Windows', 'macOS'],
 'x_mitre_version': '1.3'}
Quick Actions
Related Threat Actors (19)
LazyScripter
High

FIN8
High

Rocke
High

RedCurl
High

Gamaredon Group
High