Thursday, May 8, 2025
HomeAPTEARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS

EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS

Published on

SIEM as a Service

Follow Us on Google News

Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical organizations globally.

Unlike common malware, APTs employ evasive tactics, techniques, and procedures (TTPs) to remain undetected for extended periods.

Their command-and-control (C&C) communications often mimic legitimate web traffic, making detection particularly challenging for traditional Network Intrusion Detection Systems (NIDS).

- Advertisement - Google News

To address this challenge, researchers from Imperial College London have introduced EARLYCROW, a novel approach for detecting APT malware C&C activities over HTTP(S).

The EARLYCROW Approach

EARLYCROW is designed to identify malicious network traffic by leveraging contextual summaries derived from network packet captures (PCAP).

Overview of the PAIRFLOW workflow

Central to its methodology is the introduction of a new multipurpose network flow format called PAIRFLOW, which aggregates behavioral, statistical, and protocol-specific attributes of network traffic.

This enables the system to detect malicious patterns even in encrypted HTTPS communications.

The design of EARLYCROW is informed by a threat model that focuses on four primary cases of APT behavior:

  1. Case I: Malware with a hard-coded Fully Qualified Domain Name (FQDN) communicates with C&C servers via HTTP or HTTPS.
  2. Case II: Malware connects directly to an IP address embedded in the code, bypassing DNS resolution.
  3. Case III: Similar to Case I but uses raw TCP for subsequent communications.
  4. Case IV: Similar to Case II but relies on raw TCP instead of HTTP(S).

The system emphasizes detecting TTPs such as fallback channels, protocol impersonation, and low-profile communication patterns, which are often employed by APTs to evade detection.

Key Features of EARLYCROW

  • PAIRFLOW Format: PAIRFLOW captures detailed connection-level data, including FQDNs, URLs, user-agent strings, encryption settings, and statistical metrics like packet interarrival times and data exchange ratios.
  • Contextual Summaries: By grouping features into profiles for hosts, destinations, and URLs, EARLYCROW builds a comprehensive view of network activity.
  • Detection Versatility: The system performs well in scenarios where only encrypted HTTPS traffic is visible, achieving high accuracy without requiring payload decryption.
EARLYCROW
Overview of the EARLYCROW architecture.

EARLYCROW was evaluated using real-world datasets containing both known and unseen APT malware samples. Key findings include:

  • Achieved a macro-average F1-score of 93.02% on unseen APT samples with a False Positive Rate (FPR) of just 0.74%.
  • Demonstrated robustness in detecting evasive TTPs across different deployment scenarios, including cases where only HTTPS traffic was accessible.
  • Outperformed baseline systems by effectively leveraging novel features such as data packet exchange idle times and fallback channel detection.

According to the research, EARLYCROW represents a significant advancement in the detection of stealthy APT campaigns.

By focusing on contextual summaries and innovative features tailored to APT TTPs, it provides security teams with an effective tool for early-stage detection of sophisticated threats.

Its ability to operate effectively in both HTTP and HTTPS environments ensures broad applicability across modern network infrastructures.

Heatmap for EARLYCROW-HTTPS

Further research could expand EARLYCROW’s capabilities to address other forms of malicious communication beyond HTTP(S), such as raw TCP or DNS tunneling.

Additionally, integrating EARLYCROW with existing Security Information and Event Management (SIEM) systems could enhance its operational utility in enterprise environments.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...