Suivre

, & spreading campaign uses public cloud infrastructure - Threat actors are increasingly using to achieve their objectives without having to resort to hosting their own . These types of cloud like Microsoft Azure and Amazon AWS allow attackers to set up their infrastructure and connect to the with minimal time or monetary commitments. It also makes it more difficult for defenders to track down the attackers' operations. This actor is using the DuckDNS dynamic DNS service to change domain names of the C2 hosts.

blog.talosintelligence.com/202

Inscrivez-vous pour prendre part à la conversation
nanao

Comme le soleil, les machines ne se couchent jamais.