IT threat evolution Q3 2024
SecureList
NOVEMBER 29, 2024
The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens. These documents are in fact password-protected ZIP or other archives. CloudSorcerer also employs GitHub as its initial C2 server. The group uses only freely available and open source software.
Let's personalize your content