TrickBot Malware Abusing Hacked IoT Devices as Command-and-Control Servers

Microsoft on Wednesday detailed a previously undiscovered technique put to use by the TrickBot malware that involves using compromised Internet of Things (IoT) devices as a go-between for establishing communications with the command-and-control (C2) servers. "By using MikroTik routers as proxy servers for its C2 servers and redirecting the traffic through non-standard ports, TrickBot adds

from The Hacker News https://ift.tt/rG3SAgl
via IFTTT

Comments

Popular posts from this blog

Critical Bugs Reported in Popular Open Source PJSIP SIP and Media Stack

Experts Reveal Over 150 Ways to Steal Control of 58 Android Stalkerware Apps