Government Backed Hackers Abuse Cloudflare in Malaysian Espionage Campaign
A campaign linked to a suspected Malaysian government operation has been using hidden command and control infrastructure for years, according to new findings from Oasis Security. Researchers said the activity points to a long running espionage effort that stayed active by masking backend systems and limiting exposure to public scanning tools.
The operation appears carefully maintained, with infrastructure designed to avoid visibility while supporting targeted surveillance activity. Oasis Security said the infrastructure contains links to government related networks in Malaysia and shows patterns commonly associated with state-backed online operations.
The report explains how the operators manage command and control servers in ways that reduce the chance of detection. Some systems respond differently depending on who connects to them, while others remain inaccessible unless contacted through specific paths or protocols. That setup made the servers difficult to identify through standard internet scans.
Researchers also found signs that the infrastructure has...
Copyright of this story solely belongs to hackread.com. To see the full text click HERE