Operators Behind Worldwide Linux XorDDoS Campaign Evolve Their Attack Infrastructure
The attackers behind the XorDDoS campaign have migrated their offensive infrastructure to legitimate public hosting services, making it harder to block their command and control (C2) traffic.