Phishing Download Exfiltration
Attackers have hosted malware on and utilized the sharing capabilities and phish users to download it.
Command and Control
Attackers have used for C&C by retrieving files with commands to be executed. An example of a malware that uses as C&C is SysJoker.
Exfiltration can be used to store exfiltrated files on there. GC2 is an open-source tool that utilizes for exfiltration.
Download creates shared links for files which enables attackers to download additional tools.
Service Provider
Created: 2021-11-10
Last Update: 2021-11-10
Credits: mr.d0x