Command and Control
ix.io be used for C&C purposes. The attacker will place commands on a textbin paste and have the malware fetch the commands.
Attackers will paste sensitive data onto ix.io and share the link with themselves for later access.
Attackers upload the source code of tools onto ix.io and download them when required.
Last Update: 2022-07-28