Rules Contributing to ICMP Based Exfiltration or Tunneling Alert

The following rules are used to identify data exfiltration attempts over ICMP protocol. Any one or more of these will trigger the ICMP Based Exfiltration or Tunneling Alert. Details for each rule can be viewed by clicking the More Details link in the description.

Title

Description

ICMP Based Exfiltration or Tunneling

Detects Exfiltration Over Alternative Protocol - ICMP. Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.