#command-and-control-infrastructure

[ follow ]
Information security
fromThe Hacker News
2 hours ago

Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

A coordinated campaign uses fake Next.js repositories and job assessment lures to trick developers into executing malicious code that establishes persistent command-and-control access.
fromSecurityWeek
21 hours ago

Google Disrupts Chinese Cyberespionage Campaign Targeting Telecoms, Governments

The attacker was using API calls to communicate with SaaS apps as command-and-control (C2) infrastructure to disguise their malicious traffic as benign, a common tactic used by threat actors when attempting to improve the stealth of their intrusions. Rather than abusing a weakness or security flaw, attackers rely on cloud-hosted products to function correctly and make their malicious traffic seem legitimate.
Information security
[ Load more ]