July 1, 2022, 1:20 a.m. | Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu

cs.CR updates on arXiv.org arxiv.org

Command and control (C&C) is important in an attack. It transfers commands
from the attacker to the malware in the compromised hosts. Currently, some
attackers use online social networks (OSNs) in C&C tasks. There are two main
problems in the C&C on OSNs. First, the process for the malware to find the
attacker is reversible. If the malware sample is analyzed by the defender, the
attacker would be exposed before publishing the commands. Second, the commands
in plain or encrypted …

ai command command and control control covert

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

SOC Cyber Threat Intelligence Expert

@ Amexio | Luxembourg, Luxembourg, Luxembourg

Systems Engineer - SecOps

@ Fortinet | Dubai, Dubai, United Arab Emirates

Ingénieur Cybersécurité Gouvernance des projets AMR H/F

@ ASSYSTEM | Lyon, France

Senior DevSecOps Consultant

@ Computacenter | Birmingham, GB, B37 7YS