384. Adversaries Abuse Spotify and Chess.com
Hello everyone! Another day, another Dead Drop Resolver (T1102.001). And this time, the exploited web services are even more interesting than usual. According to Solar’s research on MaskGram Stealer , in addition to the already popular platforms among attackers - Steam and Telegram - threat actors also used Spotify and Chess.com. As before, it’s important to pay attention to communications with legitimate web services that attackers leverage as part of this technique, and to identify unusual processes: event_type: "dnsreqwin" AND dns_rname: ("spotify.com" OR "chess.com") AND NOT proc_file_path: ("your_exclusion_list") See you soon!