Perhaps the encryption can be defeated in reverse engineering of the encryption keys. If the communication is the same payload as one in the hacked version (prior years to Storm), just encrypted differently, this can be attacked with looking at the first encrypted packets to derive the keys, given that the header of the communication is the same payload.