The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-control (C2) and exfiltration to hide its malicious activities.
First seen on darkreading.com
Jump to article: www.darkreading.com/cloud-security/attackers-abuse-aws-southeast-asian-governments-novel-rat
![]()

