DISCARDED: Tales From the Threat Research Trenches cover image

Champagne Attack Chains on a Kool-Aid Budget

DISCARDED: Tales From the Threat Research Trenches

00:00

Exploiting Legitimate Services: Unconventional C2 Methods

This chapter delves into the unconventional command and control methods leveraged by threat actors, examining the exploitation of platforms like Steam and GitHub for malicious activities. It emphasizes the misuse of the open-source tool Lazy, as well as the critical need for improved tracking and detection of these threats.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app