Abuse Telegraph API Contact C2
According to investigators, C2’s establishment has been created by the official telephub of Telegraph API, which makes it difficult.
“Although C2 operating systems are not something we see everyday, it is the most effective way for attackers. And what C2 communication, “investigators commented.
Backdoor uses the telegram as its C2 method through the open geograph package to share it, the blog post added. First make up the bot example using the telegraph dadlist
Source link