Threat Analysis: Active C2 Discovery Using…

Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad)

Threat Analysis: Active C2 Discovery Using…

ShadowPad is a modular malware platform privately shared with multiple PRC-linked threat actors since 2015. According to SentinelOne, ShadowPad is highly likely the successor to PlugX. Due to its prevalence in the cyber espionage field, the VMware Threat Analysis Unit (TAU) was motivated to analyze the command and control (C2) protocol to discover active ShadowPad … Continued The post Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad) appeared first on VMware…Read More


VMware Social Media Advocacy

Leave a Comment