![]() įox Kitten has used the open source reverse proxy tools including FRPC and Go Proxy to establish connections from C2 to local servers. Įarth Lusca adopted Cloudflare as a proxy for compromised servers. Infected computers become part of a P2P botnet that can relay C2 traffic to other infected peers. ĭridex contains a backconnect module for tunneling network traffic through a victim's computer. ĬopyKittens has used the AirVPN service for operational activity. īlue Mockingbird has used frp, ssf, and Venom to establish SOCKS proxy connections. īisonal has supported use of a proxy server. īADCALL functions as a proxy server between the victim and C2 server. ![]() ĪuditCred can utilize proxy for communications. Īria-body has the ability to use a reverse SOCKS proxy module. APT41 used a tool called CLASSFON to covertly proxy network communications. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |