Detecting Malware Abusing Google for Command-and-Control
Malware often abuses cloud services for command-and-control. It's not a new technique but has been used recently by the Voldemort malware. In this post, we describe two different threat hunts that can detect this activity.