TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Cisco Security Blog

Inside the Mobile World Congress 2026 SOC: Detecting Shadow Traffic with Firepower 6100

Christopher Grabowski · 2026-04-09 · Read original ↗

ATT&CK techniques detected

5 predictions
T1071.001Web Protocols
82%
"a benign, trusted domain, while the actual destination server is something else entirely. the goal is to confuse security devices into ignoring or misclassifying the session. at mwc, shadow traffic detection flagged a connection with www. google. com in the tls client hello sni t…"
T1090.003Multi-hop Proxy
78%
"creative the stealth techniques may be – ranging from the use of non - standard ports and randomized urls to emerging cryptographic protocols not yet widely supported on most firewalls today. multihop proxies multihop proxies do exactly what the name suggests — instead of routing…"
T1090.002External Proxy
64%
"relay infrastructure. it ’ s worth pausing on that for a moment – icloud private relay isn ’ t malicious. it ’ s a legitimate and widely used apple privacy feature. but from a network policy standpoint, it still creates a visibility gap, and many organizations may decide to disab…"
T1090.002External Proxy
64%
"creative the stealth techniques may be – ranging from the use of non - standard ports and randomized urls to emerging cryptographic protocols not yet widely supported on most firewalls today. multihop proxies multihop proxies do exactly what the name suggests — instead of routing…"
T1090.004Domain Fronting
45%
"i wanted to make sure this capability gets your attention, because deployed correctly in your organization ’ s firewall policy, it closes a gap that many teams don ’ t even know they have. domain fronting is technically one of the cleverest techniques in the shadow traffic toolki…"

Summary

Cisco is the sole supplier of network services to Mobile World Congress. The Security and Network Operations Center used Cisco Secure Firewall 6100, Secure Access, Cisco XDR and Splunk to bring them together.