thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2

Preview meta tags from the thestack.technology website.

Linked Hostnames

13

Thumbnail

Search Engine Appearance

Google

https://thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2

From Graph API to Tor, malware gets creative with C2

Elastic and Microsoft analysed new threat campaigns this week. Both use unusual techniques for C2 to exfiltrate data or infiltrate commands



Bing

From Graph API to Tor, malware gets creative with C2

https://thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2

Elastic and Microsoft analysed new threat campaigns this week. Both use unusual techniques for C2 to exfiltrate data or infiltrate commands



DuckDuckGo

https://thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2

From Graph API to Tor, malware gets creative with C2

Elastic and Microsoft analysed new threat campaigns this week. Both use unusual techniques for C2 to exfiltrate data or infiltrate commands

  • General Meta Tags

    13
    • title
      From Graph API to Tor, malware gets creative with C2
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • HandheldFriendly
      True
    • viewport
      width=device-width, initial-scale=1.0
  • Open Graph Meta Tags

    8
    • og:site_name
      The Stack
    • og:type
      article
    • og:title
      From Graph API to Tor, malware gets creative with C2
    • og:description
      "By relying on Tor hidden services, the compromised system creates a persistent circuit to the Tor network"
    • og:url
      https://www.thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2/
  • Twitter Meta Tags

    9
    • twitter:card
      summary_large_image
    • twitter:title
      From Graph API to Tor, malware gets creative with C2
    • twitter:description
      "By relying on Tor hidden services, the compromised system creates a persistent circuit to the Tor network"
    • twitter:url
      https://www.thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2/
    • twitter:image
      https://www.thestack.technology/content/images/size/w1200/2025/02/bradley-dunn-cYQ77_IQFaQ-unsplash.jpg
  • Link Tags

    19
    • alternate
      https://www.thestack.technology/rss/
    • canonical
      https://www.thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2/
    • icon
      https://www.thestack.technology/content/images/size/w256h256/2023/03/-23820-Stack-Technology-Icon-Oct-2020-----BLACK-v4.png
    • preconnect
      https://fonts.googleapis.com
    • preconnect
      https://fonts.gstatic.com

Links

22