Discussion about this post

User's avatar
Neural Foundry's avatar

The relay network setup is clevr where they use one victim org's infra to pivot into the next target. Abusing the Google Drive API for C2 with NANOREMOTE is practical since it blends into legit cloud traffic, but it also means defenders need to tighten app-based access controls that most orgs barely monitor. I worked with a team once that found beaconing through Dropbox and it took them weeks to realize it wasnt internal file sync.

Expand full comment

No posts

Ready for more?