The malware may communicate with public services such as Google or Dropbox. These services can be used for the staging of malware or C2 communication.

Public services

  • Twitter
  • Google Drive
  • Dropbox
  • Box
  • AOL instant messenger
  • pCloud
  • Gmail
  • hmamail.com
  • Microsoft OneDrive

Malware/Threat actors

Name Type Years Source
Trojan.APT.Seinup malware 2012-2013 Trojan.APT.Seinup.pdf

APT37 threat actor 2014-2017 rpt_APT37.pdf

Dukes ThreatActor 2008-2015 dukes_whitepaper.pdf

Operation Potato threat actor 2011-2015 Operation-Potao-Express_final_v2.pdf

APT10 threat actor 2018 cloud-hopper-report-final-v4.pdf

cloud-hopper-report-final-upda_72977.pdf

cta-2019-0206.pdf

Preventions

<Mitigation techniques>

Detections

<Detection techniques>

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References

  • [<Source name>](<Source link>)