Published signals

TCP Handshake as a Covert Channel: Sequence Number Triggered Backdoor

Score: 7/10 Topic: TCP Sequence Number Backdoor

A Chinese security researcher has published a technique that uses TCP sequence numbers as a trigger for a covert backdoor. This method hides command-and-control traffic within normal TCP handshakes, making detection difficult. It represents a novel approach to network-based persistence.

A recent publication from a Chinese security researcher details a novel technique for establishing a covert backdoor using TCP sequence numbers. The method works by embedding a trigger within the initial sequence number (ISN) of a TCP handshake. When a client sends a SYN packet with a specific sequence number pattern, the server-side implant activates and establishes a reverse connection. This approach is particularly stealthy because it blends in with normal TCP traffic and does not require any additional ports or protocols. The technique demonstrates a deep understanding of TCP internals and offers a new vector for red team operations and malware authors. While the proof-of-concept is publicly available, the core idea is what makes this noteworthy: using a fundamental network protocol feature as a covert channel. Security teams should be aware of this technique as it may evade traditional network monitoring tools that do not inspect sequence number patterns.