261. Another Legitimate Web Service Abused by APT28

Hello everyone!

Adversaries often abuse legitimate tools, but the same can be said about web services. Today we'll look at how APT28 leveraged Web Service: Bidirectional Communication (T1102.002).

According to this report, the group leveraged BeardShell malware, which used an icedrive account as a C2 channel. It's not the first time a threat actor abuses a web service, but I haven't seen this one. 

As always, we can look for any suspicious network connections related to it:

event_type: "dnsreqwin"

AND

dns_rname: "icedrive.net"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge