Today > | 13 High | 31 Medium | 2 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This report examines an infrastructure used to control compromised edge devices transformed into Operational Relay Boxes for launching cyber attacks. The infrastructure, consisting of 63 identified servers, uses GobRAT and Bulbature malware to compromise devices and create a botnet. Features includ…