• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

BackConnect XOR Protocol Activity

Risk Factors

Several malware variants communicate with command-and-control (C&C) servers over the BackConnect XOR protocol. A skilled attacker can take advantage of custom BackConnect messages to run a wide range of C&C commands. BackConnect messages are strong indicators of compromise and should be investigated.

Kill Chain

Command-and-Control

Risk Score

88

Detection diagram
Next in Command-and-Control: BadCandy Web Shell Activity

Attack Background

BackConnect XOR is a protocol that enables C&C communication for malware such as IcedID, Qakbot, and Latrodectus. After malware is installed on a device, the malware connects with an attacker-controlled C&C server on ports 443 or 8080. The attacker sends a BackConnect message to the victim. The message can contain several types of commands. Some commands transform the victim into a SOCKS proxy for malicious traffic. Other commands create a reverse shell or launch a hidden VNC remote desktop session with the victim.

Mitigation Options

Block unnecessary outbound traffic on ports 443 and 8080

MITRE ATT&CK ID

What else can RevealX do for you?