http://www.haktechs.com/pingback-malware-using-icmp-for-covert-communication/
Pingback Malware Using ICMP for Covert Communication