Zephyrnet Logo

TrickBot Malware Abusing MikroTik Routers as Proxies for Command-and-Control

Date:

Microsoft on Wednesday detailed a previously undiscovered technique put to use by the TrickBot malware that involves using compromised Internet of Things (IoT) devices as a go-between for establishing communications with the command-and-control (C2) servers. “By using MikroTik routers as proxy servers for its C2 servers and redirecting the traffic through non-standard ports, TrickBot adds

spot_img

Latest Intelligence

spot_img