TrickBot Malware Abusing MikroTik Routers as Proxies for Command-and-Control

This article has been indexed from The Hacker News

Microsoft on Wednesday detailed a previously undiscovered technique put to use by the TrickBot malware that involves using compromised Internet of Things (IoT) devices as a go-between for establishing communications with the command-and-control (C2) servers.
“By using MikroTik routers as proxy servers for its C2 servers and redirecting the traffic through non-standard ports, TrickBot adds

Read the original article: TrickBot Malware Abusing MikroTik Routers as Proxies for Command-and-Control