One Article Review

Accueil - L'article:
Source The_Hackers_News.webp The Hacker News
Identifiant 6505794
Date de publication 2022-08-24 23:29:00 (vue: 2022-08-24 19:05:54)
Titre Crypto Miners Using Tox P2P Messenger as Command and Control Server
Texte Threat actors have begun to use the Tox peer-to-peer instant messaging service as a command-and-control method, marking a shift from its earlier role as a contact method for ransomware negotiations. The findings from Uptycs, which analyzed an Executable and Linkable Format (ELF) artifact ("72client") that functions as a bot and can run scripts on the compromised host using the Tox protocol. Tox
Notes
Envoyé Oui
Condensat 72client actors analyzed artifact begun bot can command compromised contact control crypto earlier elf executable findings format from functions have host instant its linkable marking messaging messenger method miners negotiations p2p peer protocol ransomware role run scripts server service shift threat tox uptycs use using which
Tags Ransomware Threat
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: