New Malware Exploiting Outlook As a Communication Channel via The Microsoft Graph API (cybersecuritynews.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 13 Feb 13:20
https://sh.itjust.works/post/32724881

#cybersecurity

threaded - newest

lungdart@lemmy.ca on 13 Feb 14:02 collapse

I didn’t understand from that article how the c2 server reaches the malware.

How could a remote server access the draft emails on a hosts Outlook client? I can see how the client can manipulate them and stuff data to avoid detection, but I don’t see how the c2 server access them.

Maybe I need to know more about the graph API?