353. Adversaries Abuse Fastly for C2 Infrastructure
Hello everyone!
Let's look at another interesting example of how adversaries abuse legitimate infrastructure for C2. This time it's Fastly.
Kaspersky revealed another ForumTroll campaign. This time the adversary leveraged Tuoni - a commercial red teaming framework. At the same time, the threat actors used the same service for C2 as in previous campaigns - Fastly.
What does it mean? We can use it for our threat hunting missions!
event_type: "dnsreqwin"
AND
dns_rname: "fastly.net"
See you tomorrow!

Comments
Post a Comment