Vice Society: A tale of victim data exfiltration via PowerShell, aka stealing off the land

Threat actors (TAs) using built-in data exfiltration methods like LOLBAS negate the need to bring in external tools that might be flagged by security software and/or human-based security detection mechanisms. These methods can also hide within the general operating environment, Read More …

Iranian hacker group becomes first known APT to weaponize DNS-over-HTTPS (DoH)

An Iranian hacking group known as Oilrig has become the first publicly known threat actor to incorporate the DNS-over-HTTPS (DoH) protocol in its attacks. Speaking in a webinar last week, Vincente Diaz, a malware analyst for antivirus maker Kaspersky, said Read More …