New I2PRAT communicates via anonymous peer-to-peer network
(www.gdatasoftware.com)
from Joker@sh.itjust.works to cybersecurity@infosec.pub on 18 Dec 12:24
https://sh.itjust.works/post/29659861
from Joker@sh.itjust.works to cybersecurity@infosec.pub on 18 Dec 12:24
https://sh.itjust.works/post/29659861
Criminals try to cover their tracks as best they can. This also includes hiding any activities that control the machines they have compromised. Using I2P is one way of doing that, but until recently this has rarely been used.
threaded - newest