Protocol Tunnelling

Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. Tunneling involves explicitly encapsulating a protocol within another.
This behavior may conceal malicious traffic by blending in with existing traffic and/or provide an outer layer of encryption [1]

ID: T2047
Sub-techniques:  No sub-techniques
Platforms: Space Segment, Space-link communication
Version: 2.0
Created: 20 April 2023
Last Modified: 05 February 2025

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References