1. Stealthy Data Transfer
An attacker uses ICMP to exfiltrate small, encrypted data segments from a compromised server, avoiding firewall detection.
2. C2 Channel Backup
After a primary C2 channel is disrupted, an attacker switches to ICMP as a fallback communication method for maintaining control over a compromised system.