Command and Control
Commands can be entered on ideone.com and have malware fetch them.
Exfiltration
Attackers will paste sensitive data onto ideone.com and share the link with themselves for later access.
Download
Attackers can upload the source code of tools onto ideone.com and download them when necessary.
Created: 2022-03-27
Last Update: 2022-03-27
Credits: @jsh0x