Traffic mirroring is an important part of network diagnostics — but it also opens the door to data exfiltration. Here’s what you need to know about this attack technique.
Traffic mirroring is an Amazon Virtual Private Cloud (VPC) feature that lets you copy network traffic and send it to another destination, such as an inspection or troubleshooting tool. According to AWS, this technique works by copying inbound and outbound traffic from the network interfaces that are attached to your EC2 instances. You can send this mirrored traffic to a network or gateway load balancer with a UDP listener, or to the network interface of another instance. Components include:
The traffic mirror filter, or inbound and outbound rules that determine which traffic to copy and send
Traffic mirroring can be implemented at various points in a network, such as on switches, routers, or dedicated network taps. The mirrored traffic is typically directed to security appliances, intrusion detection systems (IDS), intrusion prevention systems (IPS), or a security information and event management (SIEM) system. The goal is to provide these tools with real-time data without interrupting the flow of the original traffic. Benefits include:
It’s important to note that while traffic mirroring is a fundamental part of network diagnostics, it’s also a way for attackers to exfiltrate your data.
Attackers use traffic mirroring to intercept, capture, and analyze network communications without authorization. By duplicating network traffic and directing it to a location they control, attackers can gain access to sensitive information, monitor communications, and exploit vulnerabilities within a network.
The only proven way to catch malicious traffic mirroring before it starts is with advanced AI and machine learning. That’s why Vectra AI’s security engineers built an advanced AI-driven detection model specifically for traffic monitoring. Security analysts use it to see when an AWS control-plane API is invoked — the earliest sign of a malicious attempt to leverage traffic mirroring — so you can stop the attacker before they have a chance to create a network traffic session.