Command & Control

Hidden HTTPS Tunnel

Hidden HTTPS Tunnel

Detection overview

The Hidden HTTPS Tunnel detection identifies the use of HTTPS traffic to covertly communicate with external command and control servers by encapsulating another protocol within HTTPS sessions. Attackers use this technique to evade detection by blending malicious traffic with legitimate HTTPS traffic, making it difficult to identify without advanced analysis.

Triggers

  • An internal host is communicating with an outside IP using HTTPS where another protocol is running over the top of the HTTPS sessions
  • This represents a hidden tunnel involving one long session or multiple shorter sessions over a longer period of time mimicking normal encrypted Web traffic
  • When it can be determined whether the tunneling software is console-based or driven via a graphical user interface, that indicator will be included in the detection

Possible Root Causes

  • A targeted attack may use hidden tunnels to hide communication with command and control servers over SSL on port 443
  • A user is utilizing tunneling software to communicate with Internet services which might not otherwise be accessible
  • Intentionally installed software is using a hidden tunnel to bypass expected firewall rules

Business Impact

  • The use of a hidden tunnel by some software may be benign, but it represents significant risk as the intention is to bypass security controls
  • Hidden tunnels used as part of a targeted attack are meant to slip by your perimeter security controls and indicate a sophisticated attacker
  • Hidden tunnels are rarely used by botnets, though more sophisticated bot herders with more ambitious goals may utilize them

Steps to Verify

  1. Check to see if the destination IP or domain of the tunnel is an entity you trust for your network
  2. Ask the user of the host whether they are using hidden tunnel software for any purpose
  3. Before removing the offending software via antivirus or reimaging, take a memory snapshot for future analysis of the incident
  4. If the behavior reappears shortly after a reimaging, this may be a hardware/BIOS tunnel

Screenshot of the Vectra AI platform showing signs of a hidden HTTPS tunnel
Screenshot of the Vectra AI platform showing signs of a hidden HTTPS tunnel
Hidden HTTPS Tunnel

Possible root causes

Malicious Detection

  • An attacker using an internal host to communicate with an external command and control server by tunneling malicious protocols over HTTPS.
  • Malware installed on the internal host designed to use HTTPS tunnels to exfiltrate data or receive commands from an attacker.
  • Compromised internal host part of a botnet using HTTPS to evade network security measures.

Benign Detection

  • Security or network management tools performing legitimate tasks that involve unusual HTTPS traffic patterns.
  • Legitimate software updates or cloud services that use non-standard HTTPS communication.
  • Misconfigured applications or services generating traffic that resembles hidden tunnels.
Hidden HTTPS Tunnel

Example scenarios

Scenario 1: An internal host communicates with an external IP over HTTPS, displaying consistent communication patterns and unusual payload sizes. Further investigation reveals the presence of malware using HTTPS tunneling to exfiltrate data.

Scenario 2: A security audit detects long-duration HTTPS sessions from an internal host to a suspicious domain. Analysis shows the sessions contain hidden command and control traffic, indicating the host is compromised and part of a botnet.

Hidden HTTPS Tunnel

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Data Exfiltration

Hidden HTTPS tunnels can be used to exfiltrate sensitive data from the organization, leading to potential financial and reputational damage.

Unauthorized Remote Access

Attackers can use these tunnels to maintain persistent remote access, allowing them to control compromised hosts undetected.

Bypassing Security Controls

The use of encrypted tunnels can bypass traditional network security measures, increasing the risk of undetected malicious activity.

Hidden HTTPS Tunnel

Steps to investigate

FAQs

What is a Hidden HTTPS Tunnel?

How can I detect a Hidden HTTPS Tunnel in my network?

What are the common signs of a Hidden HTTPS Tunnel?

Why are Hidden HTTPS Tunnels a significant threat?

Can legitimate software trigger this detection?

What steps should I take if I detect a Hidden HTTPS Tunnel?

How does Vectra AI identify Hidden HTTPS Tunnels?

What tools can help verify the presence of a Hidden HTTPS Tunnel?

What is the business impact of a Hidden HTTPS Tunnel?

How can I prevent Hidden HTTPS Tunnels?