Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2…