Author Topic: Attackers Employ Sneaky New Method to Control Trojans  (Read 31 times)

0 Members and 1 Guest are viewing this topic.

Offline Scarlett

  • Updates Moderator
  • *
  • Posts: 22996
Attackers Employ Sneaky New Method to Control Trojans
« Reply #1 on: March 03, 2017, 10:53:19 PM »
Attackers Employ Sneaky New Method to Control Trojans
3 March 2017, 9:50 pm

A new malware sample shows threat actors have begun using DNS TXT record and queries for C2 communications, Cisco Talos says,

Source: Dark Reading:

>> To obtain the full Dark Reading article, click the link in the first post line <<

 


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2018 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by DSTM & PseFrank

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified Log / Malware Analysis & Removal Help and System Health Checks