108. IronHusky Abuses Piping Server for C&C
Hello everyone! Today we'll talk about another interesting service abused by the threat actors for C&C communications.
According to this report by Kaspersky team, IronHusky used the legitimate https://ppng[.]io server powered by the piping-server project to request commands and send back their execution results.
What does it mean? We can hunt for communications with this domain:
event_type: "dnsreq"
AND
dns_rname: "ppng.io"
The adversary leveraged aforementioned backdoor to download MysterySnail RAT.
See you tomorrow!
Comments
Post a Comment