(no title)
litheon | 1 month ago
The author basically found a creative use of Hinge’s infrastructure and proved it could be used to control malware.
litheon | 1 month ago
The author basically found a creative use of Hinge’s infrastructure and proved it could be used to control malware.
lisbbb|1 month ago
richbell|1 month ago
A secondary goal is to do so while evading detection. This is why many threat actors piggy-back off of legitimate services, it disguises the malware communications and avoids directly exposing the upstream C2 instance.