108. IronHusky Abuses Piping Server for C&C

Hello everyone! Today we'll talk about another interesting service abused by the threat actors for C&C communications.

According to this report by Kaspersky team, IronHusky used the legitimate https://ppng[.]io server powered by the piping-server project to request commands and send back their execution results.

What does it mean? We can hunt for communications with this domain:

event_type: "dnsreq"

AND

dns_rname: "ppng.io"

The adversary leveraged aforementioned backdoor to download MysterySnail RAT.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge