• Tools
  • ATOMs
  • About Us

Posts tagged with: C2

This conceptual image illustrates the idea of malware, such as the njRAT spreading through active Pastebin command and control tunnel that is discussed in this blog.
18,974
people reacted

njRAT Spreading Through Active Pastebin Command and Control Tunnel

  • By Yanhui Jia, Chris Navarrete and Haozhe Zhang
  • December 9, 2020 at 6:00 AM

6

6 min. read

A conceptual image illustrating the concept of espionage, including the type of stealthy activity using backdoors that threat researchers observed the xHunt campaign using.
25,789
people reacted

xHunt Campaign: Newly Discovered Backdoors Using Deleted Email Drafts and DNS Tunneling for Command and Control

  • By Robert Falcone
  • November 9, 2020 at 12:00 AM

14

12 min. read

Trending

  • COVID-19: Cloud Threat Landscape
  • SilverTerrier: New COVID-19 Themed Business Email Compromise Schemes
  • Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
  • Threat Brief: Maze Ransomware Activities
  • COVID-19 Themed Malware Within Cloud Environments

Prince of Persia – Game Over

  • By Tomer Bar, Lior Efraim and Simon Conant
  • June 28, 2016 at 3:00 PM

0

7 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2021 Palo Alto Networks, Inc. All rights reserved.