Fail2ban is not a static security policy.
It’s a dynamic firewall. It ties logs to time boxed firewall rules.
You could auto ban any source that hits robots.txt on a Web server for 1h for instance. I’ve heard AI data scrapers actually use that to target big data rather than respect web server requests.
I didn’t understand from that article how the c2 server reaches the malware.
How could a remote server access the draft emails on a hosts Outlook client? I can see how the client can manipulate them and stuff data to avoid detection, but I don’t see how the c2 server access them.
Maybe I need to know more about the graph API?