Malicious actors are increasingly using public services like GitHub to host malware, enabling them to bypass detection tools. Threat research team ReversingLabs identified two novel techniques being used on GitHub. The first exploits GitHub Gists to host two-stage malicious payloads, while the second issues commands through git commit messages. Using GitHub for command and control (C2) infrastructure allows attackers to communicate with infected computers without arousing suspicion.
Microsoft seizes 338 websites to disrupt rapidly growing ‘RaccoonO365’ phishing service
Giles Bruce reports: Microsoft has seized 338 phishing websites associated with a cybercrime service that targeted at least 20 U.S. healthcare organizations. Using a court order granted