1. Covert Data Exfiltration
A compromised server sends ICMP packets containing encoded data to an external attacker-controlled host, avoiding traditional data monitoring systems.
2. Fallback Communication for Malware
Malware switches to using ICMP for C2 communication after primary channels are disrupted or blocked.