Exfiltration Over Symmetric Encrypted Non-C2 Protocol

From RCATs

Adversaries may steal data by exfiltrating it over a symmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.