Malware uses Azure Functions as C2 backend

A new malware campaign abuses Azure Functions as a command and control backend. It uses a malicious ISO image with DLL side-loading for payload injection. The payload sends encrypted system metadata to an Azure-hosted server, profiling compromised hosts. The campaign spans multiple regions, with ongoing analysis uncovering advanced evasion and persistence techniques. https://lnkd.in/geAwKbGY

To view or add a comment, sign in

Explore content categories