top of page
Dragon News Blog
S2 Research Team
Dec 21, 20229 min read
Inside the IcedID BackConnect Protocol
Deriving Threat Actor TTPs from Management Infrastructure Tracking You can find our previous work on Stage 1 and Stage 2 of IcedID’s...
bottom of page