Attackers can use *.wasabisys.com to host phishing templates.
Command and Control
Attackers can use *.wasabisys.com for C&C purposes.
Wasabisys' S3 storage capabilities can be used to store exfiltrated files on there.
Malicious tools can be stored on *.wasabisys.com and downloaded when required.
Last Update: 2021-12-19