Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.
Behavioral Detection of Fallback or Alternate C2 Channels
Network Intrusion Prevention: Use intrusion detection signatures to block traffic at network boundaries.