Threat Management

Dark Utilities C2 service gains traction among threat actors

Share

BleepingComputer reports that more cybercriminals have been leveraging the novel Dark Utilities C2-as-a-service as an affordable and convenient means to establish command-and-control servers for attacks. Nearly 3,000 users have been subscribed to Dark Utilities, which provides complete C2 functionality on the web or Tor network, since its emergence early this year, a Cisco Talos report showed. Windows-, Python-, and Linux-based payloads are supported by Dark Utilities, which uses the Interplanetary File System for payload hosting, according to the report, which also noted operators' future plans of expanding the list of targeted devices. Dark Utilities also allows the generation of command stings commonly used for payload retrieval and execution on targeted systems. Different modules for cryptojacking, distributed denial-of-service, and other cyberattacks are also being offered in Dark Utilities' administrative panel, said Cisco Talos researchers who expect that the C2aaS gains more traction due to its affordable price and already robust subscriber count.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.