March 1, 2023, 4:17 a.m. | /u/AdLast4483

Malware Analysis & Reports www.reddit.com

Out of curiosity, has anyone observed this behavior with any of the current crop of info stealers? I have a hypothesis that some of them may be creating these links (perhaps via a powershell API) and then sending them back to the C2 server. This would create some sort of persistent access to data even after a password change. I've scanned all the deepdive whitepapers and haven't seen any references to this.

access anonymous api back change curiosity current data info info stealers links major malware may onedrive password persistent powershell server share sort stealers whitepapers

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605