Security News > 2015 > May > APT group's malware retrieved C&C IP addresses from Microsoft's TechNet portal (Help Net Security)
2015-05-14 13:49
A China-based APT group has been using Microsoft’s TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers have revealed. "While other g...
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/sM38Zoghmew/malware_news.php
Related news
- Vultur banking malware for Android poses as McAfee Security app (source)
- Winnti's new UNAPIMON tool hides malware from security software (source)
- Microsoft slammed for lax security that led to China's cyber-raid on Exchange Online (source)
- Microsoft slammed for lax security that led to China's cyber-raid on Exchange Online (source)
- Microsoft fixes Outlook security alerts bug caused by December updates (source)
- Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs (source)
- Microsoft fixes two Windows zero-days exploited in malware attacks (source)
- Microsoft squashes SmartScreen security bypass bug exploited in the wild (source)
- GitHub comments abused to push malware via Microsoft repo URLs (source)
- Microsoft and Security Incentives (source)