Which method is used by some malware to transfer files from infected hosts to a threat actor host?
- HTTPS traffic encryption
- ICMP tunneling
- iFrame injection
- UDP infiltration
Answers Explanation & Hints:
ICMP traffic from inside the company is also a threat. Some varieties of malware use ICMP packets to transfer files from infected hosts to threat actors via ICMP tunneling. |