HI,
I read an interesting article the other day through a post on this forum
Original Article
Forum Post
The article states that the malware uses Tor hidden service to communicate with the server for commands. A line in the article states
"We managed to patch and hijack the malware and make it connect to an IRC server hosted behind a Tor Hidden Service that we created uniquely for testing purposes"
Any idea how they were able to do it ? I wanted to try the stuff mentioned in the article. Any help would be appreciated.
Thanks
I read an interesting article the other day through a post on this forum
Original Article
Forum Post
The article states that the malware uses Tor hidden service to communicate with the server for commands. A line in the article states
"We managed to patch and hijack the malware and make it connect to an IRC server hosted behind a Tor Hidden Service that we created uniquely for testing purposes"
Any idea how they were able to do it ? I wanted to try the stuff mentioned in the article. Any help would be appreciated.
Thanks