Hunting for Mythic in network traffic

We analyze the network activity of the Mythic framework, focusing on agent-to-C2 communication, and use signature and behavioral analysis to create detection rules for Network Detection and Response (NDR) solutions.

This article has been indexed from Securelist

Read the original article: