MITRE ATT&CK Technique
Description
Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites, cloud services, and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google, Microsoft, or Twitter, makes it easier for adversaries to hide in expected noise.(Citation: Broadcom BirdyClient Microsoft Graph API 2024) Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed).
Supported Platforms
Created
April 29, 2026
Last Updated
April 29, 2026
STIX Data
{'created': '2017-05-31T21:31:13.915Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': 'Adversaries may use an existing, legitimate external Web '
'service as a means for relaying data to/from a compromised '
'system. Popular websites, cloud services, and social media '
'acting as a mechanism for C2 may give a significant amount of '
'cover due to the likelihood that hosts within a network are '
'already communicating with them prior to a compromise. Using '
'common services, such as those offered by Google, Microsoft, '
'or Twitter, makes it easier for adversaries to hide in '
'expected noise.(Citation: Broadcom BirdyClient Microsoft '
'Graph API 2024) Web service providers commonly use SSL/TLS '
'encryption, giving adversaries an added level of protection.\n'
'\n'
'Use of Web services may also protect back-end C2 '
'infrastructure from discovery through malware binary analysis '
'while also enabling operational resiliency (since this '
'infrastructure may be dynamically changed).',
'external_references': [{'external_id': 'T1102',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/techniques/T1102'},
{'description': 'Broadcom. (2024, May 2). BirdyClient '
'malware leverages Microsoft Graph '
'API for C&C communication. Retrieved '
'July 1, 2024.',
'source_name': 'Broadcom BirdyClient Microsoft Graph '
'API 2024',
'url': 'https://www.broadcom.com/support/security-center/protection-bulletin/birdyclient-malware-leverages-microsoft-graph-api-for-c-c-communication'},
{'description': 'Gardiner, J., Cova, M., Nagaraja, '
'S. (2014, February). Command & '
'Control Understanding, Denying and '
'Detecting. Retrieved April 20, 2016.',
'source_name': 'University of Birmingham C2',
'url': 'https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf'}],
'id': 'attack-pattern--830c9528-df21-472c-8c14-a036bf17d665',
'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
'phase_name': 'command-and-control'}],
'modified': '2025-10-24T17:49:02.831Z',
'name': 'Web Service',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'attack-pattern',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_contributors': ['Anastasios Pingios',
'Sarathkumar Rajendran, Microsoft Defender365'],
'x_mitre_deprecated': False,
'x_mitre_detection': '',
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_is_subtechnique': False,
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_platforms': ['ESXi', 'Linux', 'Windows', 'macOS'],
'x_mitre_version': '1.3'}