Source: The Hacker News
A recent campaign has highlighted the innovative technique employed by attackers using the Astaroth banking trojan. Instead of conventional command-and-control (C2) servers that are vulnerable to takedowns, this threat actor creatively utilizes GitHub repositories to host its malware, thereby maintaining operational resilience.
This strategy marks a significant evolution in the deployment of malware, where traditional methods are outpaced by more adaptive approaches. The rise of using platforms like GitHub not only serves to obfuscate the malware’s origin but also complicates mitigation efforts, as GitHub hosts legitimate content and is less likely to be flagged as malicious.
👉 Pročitaj original: The Hacker News