260. That's How Bloody Wolf Abuses Telegram for Exfiltration
Hello everyone!
Today we'll keep looking at Bloody Wolf, focusing on how the adversary uses the following technique: Exfiltration Over Web Service (T1567).
If we look into this report, we can see that the adversary used malicious JAR files to install NetSupport to the target system. The file also sent the name of the compromised system to a dedicated Telegram chat.And, of course, we can look for similar behavior:
event_type: "dnsreqwin"
AND
dns_rname: "telegram.org"
AND
proc_file_path: "java.exe"
See you tomorrow!
Comments
Post a Comment