149. Adversaries Abuse Free Web Hosting Infrastructure

Hello everyone!

Let's talk a bit about threat actors' infrastructure. As you know, adversaries need to store malicious files somewhere in order to distribute them. Of course, they can use their own infrastructure, but in many cases they opt to freely available variants.

For example, APT41 (we track this cluster as Wanted Werewolf). The threat actors abused various free web hosting tools for distributing their malware.

What does it mean? We can use it for hunting:

event_type: "dnsreq"

AND

dns_rname: ("workers.dev" OR "trycloudflare.com" OR "infinityfreeapp.com")

What's more, the threat actors Google Calendar for C2!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge