March 1, 2023, 4:17 a.m. | /u/AdLast4483

Malware Analysis & Reports www.reddit.com

Out of curiosity, has anyone observed this behavior with any of the current crop of info stealers? I have a hypothesis that some of them may be creating these links (perhaps via a powershell API) and then sending them back to the C2 server. This would create some sort of persistent access to data even after a password change. I've scanned all the deepdive whitepapers and haven't seen any references to this.

access anonymous api back change curiosity current data info info stealers links major malware may onedrive password persistent powershell server share sort stealers whitepapers

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC