
thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2
Preview meta tags from the thestack.technology website.
Linked Hostnames
13- 6 links towww.thestack.technology
- 4 links tothestack.technology
- 2 links towww.elastic.co
- 1 link tocloud.google.com
- 1 link tocorelight.com
- 1 link tologin.microsoftonline.com
- 1 link totwitter.com
- 1 link towww.diverto.hr
Thumbnail

Search Engine Appearance
https://thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2
From Graph API to Tor, malware gets creative with C2
Elastic and Microsoft analysed new threat campaigns this week. Both use unusual techniques for C2 to exfiltrate data or infiltrate commands
Bing
From Graph API to Tor, malware gets creative with C2
https://thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2
Elastic and Microsoft analysed new threat campaigns this week. Both use unusual techniques for C2 to exfiltrate data or infiltrate commands
DuckDuckGo

From Graph API to Tor, malware gets creative with C2
Elastic and Microsoft analysed new threat campaigns this week. Both use unusual techniques for C2 to exfiltrate data or infiltrate commands
General Meta Tags
13- titleFrom Graph API to Tor, malware gets creative with C2
- charsetutf-8
- X-UA-CompatibleIE=edge
- HandheldFriendlyTrue
- viewportwidth=device-width, initial-scale=1.0
Open Graph Meta Tags
8- og:site_nameThe Stack
- og:typearticle
- og:titleFrom Graph API to Tor, malware gets creative with C2
- og:description"By relying on Tor hidden services, the compromised system creates a persistent circuit to the Tor network"
- og:urlhttps://www.thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2/
Twitter Meta Tags
9- twitter:cardsummary_large_image
- twitter:titleFrom Graph API to Tor, malware gets creative with C2
- twitter:description"By relying on Tor hidden services, the compromised system creates a persistent circuit to the Tor network"
- twitter:urlhttps://www.thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2/
- twitter:imagehttps://www.thestack.technology/content/images/size/w1200/2025/02/bradley-dunn-cYQ77_IQFaQ-unsplash.jpg
Link Tags
19- alternatehttps://www.thestack.technology/rss/
- canonicalhttps://www.thestack.technology/from-microsoft-graph-api-to-tor-new-malware-gets-creative-with-c2/
- iconhttps://www.thestack.technology/content/images/size/w256h256/2023/03/-23820-Stack-Technology-Icon-Oct-2020-----BLACK-v4.png
- preconnecthttps://fonts.googleapis.com
- preconnecthttps://fonts.gstatic.com
Links
22- https://cloud.google.com/blog/topics/threat-intelligence/shining-a-light-on-darkside-ransomware-operations/?ref=thestack.technology
- https://corelight.com/blog/detecting-agent-tesla-malware?ref=thestack.technology
- https://login.microsoftonline.com/common/oauth2/token?ref=thestack.technology
- https://thestack.technology/apple-cofounder-values-trust-and-honesty-and-hes-pretty-sure-hes-not-getting-it-from-ai
- https://thestack.technology/author/the-stack