Attackers leveraging Dark Utilities C2aaS platform in malware campaigns


An adversary can use the Dark Utilities platform, which was first introduced in early 2022, to access fully functional C2 capabilities. It is advertised as a way to enable remote access, command execution, distributed denial-of-service (DDoS) assaults, and bitcoin mining operations on compromised systems.

Because they are hosted within the Interplanetary File System (IPFS) and support Windows, Linux, and Python-based implementations, the platform’s payloads are resistant to content moderation or government action. Read More…