A threat actor has established multiple command and control channels leveraging popular legitimate services including Microsoft Outlook, Slack, Discord, and file.io for conducting online espionage operations. This approach provides redundancy and makes detection more difficult.
Signal Search
Search across all ingested intelligence signals. Supports websearch syntax: AND OR "exact phrase" -exclude
1,630 results for "-26.3563" · Cyber+Supply Chain
Page 3 of 66