Detecting Malware Abusing Google for C2
The abuse of cloud services for malware command-and-control is not a new technique but has been used recentlyt by the Voldemort malware. In this post, we describe two different threat hunts that can help find clues of malware abusing Google services. Article Link: https://intel471.com/blog/detecting-malware-abusing-google-for-c2 1 post - 1 participant Read full topic
The abuse of cloud services for malware command-and-control is not a new technique but has been used recentlyt by the Voldemort malware. In this post, we describe two different threat hunts that can help find clues of malware abusing Google services.
Article Link: https://intel471.com/blog/detecting-malware-abusing-google-for-c2
1 post - 1 participant
What's Your Reaction?