Tag: C2
-
Novel C2 tool leveraged in latest MuddyWater attacks
Iranian state-backed threat operation MuddyWater, also known as TA450, Mango Sandstorm, and Boggy Sandstorm, leveraged the novel DarkBeatC2 …
-
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, …
-
Hackers Abuse QEMU Hardware Emulator for Stealthy C2 Communication
QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and attacks …
-
Novel malware enables C2 communications by exploiting GTP
Security researchers say a newly discovered Linux malware dubbed GTPDOOR can establish command-and-control communications in compromised …
-
SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks
Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. “SystemBC can …
-
MuddyWater attacks against Israel involve novel C2 framework
Attacks deployed by Iranian state-backed threat operation MuddyWater against Israel saw the utilization of the new MuddyC2Go …
-
MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel
Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part …
-
5 emerging malware threats, record-breaking malware activity
EXECUTIVE SUMMARY: Across the past decade, cyber security researchers have observed an alarming 87% surge in malware …
-
Novel Google Cloud RAT Uses Calendar Events for C2
Cybercriminals are abusing legitimate functions within cloud services, and providers can’t totally stop them, especially when it comes to …
-
Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel
Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host …
-
Hackers Use Weaponized PDFs and Chat Apps for C2 to Evade Detection
A malware campaign targeting the Ministries of Foreign Affairs of NATO-aligned countries was recently discovered, which used PDF files …
-
QakBot Malware Operators Expand C2 Network with 15 New Servers
The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers as of late June 2023. The …
●●●