TrickBot Malware Abusing MikroTik Routers as Proxies for Command-and-Control

In The Hacker News - Original news source is thehackernews.com by Blog Writer

Post Sharing
Microsoft on Wednesday detailed a previously undiscovered technique put to use by the TrickBot malware that involves using compromised Internet of Things (IoT) devices as a go-between for establishing communications with the command-and-control (C2) servers.
“By using MikroTik routers as proxy servers for its C2 servers and redirecting the traffic through non-standard ports, TrickBot adds