A threat actor — likely a state-sponsored cyberespionage group — has used a sophisticated technique to allow a piece of malware hosted on a server to communicate with command and control (C2) servers through a firewall.
Advertise on IT Security News.
Read the complete article: State-Sponsored Cyberspies Use Sophisticated Server Firewall Bypass Technique