Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications,
Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection.
This is done to « facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services, » the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.
This is done to « facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services, » the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.
,
Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection.
This is done to « facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services, » the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.
This is done to « facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services, » the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.
, ,
https://thehackernews.com/2024/05/hackers-increasingly-abusing-microsoft.html