New I2PRAT communicates via anonymous peer-to-peer network

Criminals try to cover their tracks as best they can. This also includes hiding any activities that control the machines they have compromised. Using I2P is one way of doing that, but until recently this has rarely been used.      

IT Pro Tuesday #332

The post IT Pro Tuesday #332 appeared first on Hornetsecurity – Next-Gen Microsoft 365 Security.

German Authorities Disrupt BADBOX Malware Operation

German law enforcement recently announced it disrupted a sophisticated malware operation, dubbed BADBOX, affecting over 30,000 internet-connected devices nationwide. The German Federal Office of Information (BSI) said it severed communication between devices and their...