"Tech Companies Mull Strategies to Block Threat Groups From Abusing Platforms"

As threat groups increasingly use cloud storage, email, and messaging platforms in cyberattacks, technology providers seek new ways to bolster their defense strategies. Threat groups have used legitimate services for command-and-control (C2) communication, payload delivery, and data exfiltration. This abuse can make cyberattacks difficult to detect for victims. In addition, this strategy reduces operational expenses and infrastructure costs for cybercriminals because it simplifies C2 server installation and eliminates the need for hosting or registration fees. According to a new report by Recorded Future's Insikt Group, Advanced Persistent Threat (APT) groups have been at the forefront of innovation efforts surrounding this type of abuse, but less sophisticated groups are following suit due to a "trickle down effect." This article continues to discuss blocking threat groups from abusing legitimate platforms. 

Decipher reports "Tech Companies Mull Strategies to Block Threat Groups From Abusing Platforms"

Submitted by Anonymous on