Attackers increasingly using transfer.sh to host malicious code

For many years now, unsecured internet-facing Redis servers have been steadily getting co-opted by criminals to mine cryptocurrency, so the latest cryptojacking campaign spotted by Cado Labs researcher cannot be considered news. But one its elements points to a new trend: attackers have increasinly begun using the (legitimate) transfer.sh service to host malicious code. They say their telemetry shows an uptick in the malicious use of the service since the beginning of 2023 and advise … More

The post Attackers increasingly using transfer.sh to host malicious code appeared first on Help Net Security.

This article has been indexed from Help Net Security

Read the original article: