A threat actor is targeting various organizations using a command-and-control (C&C) server. The server hosted samples of ransomware, point-of-sale (POS) carding malware and other digital threats. Most of the malware files hosted on the server turned out to be samples of DoppelPaymer, a ransomware family that evolved from BitPaymer. Security professionals can help defend against threats typically hosted on attackers C&C servers by implementing logging, reviewing logs for suspicious activities.”]

