353. Adversaries Abuse Fastly for C2 Infrastructure

Hello everyone!

Let's look at another interesting example of how adversaries abuse legitimate infrastructure for C2. This time it's Fastly.

Kaspersky revealed another ForumTroll campaign. This time the adversary leveraged Tuoni - a commercial red teaming framework. At the same time, the threat actors used the same service for C2 as in previous campaigns - Fastly.

What does it mean? We can use it for our threat hunting missions!

event_type: "dnsreqwin"

AND

dns_rname: "fastly.net"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge