Security researchers have uncovered a new campaign leveraging the Njrat remote access trojan (RAT) to abuse Microsoft’s developer-oriented Dev Tunnels service for covert command-and-control (C2) communications. Historically associated with credential theft and USB-based propagation, the malware now utilizes Microsoft’s infrastructure to evade traditional network defenses by masquerading as legitimate developer activity. Microsoft Dev Tunnels, designed […]
The post Njrat Attacking Users Abusing Microsoft Dev Tunnels for C2 Communications appeared first on Cyber Security News.
This article has been indexed from Cyber Security News