Website
ix.io
Tags
C&C Exfiltration Download
Phishing
None
Command and Control
ix.io be used for C&C purposes. The attacker will place commands on a textbin paste and have the malware fetch the commands.
Exfiltration
Attackers will paste sensitive data onto ix.io and share the link with themselves for later access.
Download
Attackers upload the source code of tools onto ix.io and download them when required.
Service Provider
Ix.io
Sample
Created: 2022-07-28
Last Update: 2022-07-28
Credits: @m_haggis