
Attackers coming in from the Backdoor? [Research Saturday]
CyberWire Daily
00:00
Jacxonor - What Does This Activity Look Like?
Daxonor discovered the activity first, and then looked a little closer to understand where it was being orchestrated from. In this particular instance, we stumbled across one specific file which was playing that role of a generating this extra activity on that computer. And what did that activity look like? So there's a bit of, think of it as noise which is being generated in the computer world. Daxonor: While their suspicious activity, jacxon was trying to hide every single thing that was doing under the umbrella of some existing, legitimate application within the computer.
Play episode from 04:40
Transcript


