Watch this video on YouTube
Scenario: A cybersecurity professional discovers that sensitive data from a compromised system was exfiltrated through an encrypted channel that mimicked regular HTTPS traffic. What technique was likely employed?