Attackers Abuse AWS Cloud to Target Southeast Asian Governments

The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-control (C2) and exfiltration to hide its malicious activities.

Go to Source
Author: Elizabeth Montalbano, Contributing Writer

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.