DNSpionage campaign releases new Karkoff malware into the wild
#1
Quote:The hacking group behind the DNSpionage campaign have become more choosy in their targets and have released a new form of malware to further their goals.
 
DNSpionage, first discovered in late 2018 by Cisco Talos, utilizes fake websites and specializes in DNS tampering to redirect traffic from legitimate domains to malicious ones. The threat actors also make use of free Let's Encrypt security certificates for redirected domains.
 
Past attacks have been detected against private Lebanese targets including an airline, alongside government domains used by Lebanon and the United Arab Emirates (UAE).
 
The group has now created a new remote administration tool that supports HTTP and DNS communication with their command-and-control (C2) server, according to a new Talos blog post published on Tuesday.

Since the original report, DNSpionage has now revamped its attack methods with a new reconnaissance stage in order to avoid detection by researchers and to create a "fingerprint" for victim systems.

SOURCE: https://www.zdnet.com/article/dnspionage...-the-wild/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
YouTube updates Shorts view count metho...
This is a smart and ...Kiran78 — 11:41
Microsoft Edge 135.0.3179.73
Version 135.0.3179...harlan4096 — 06:08
AnyDesk 9.5.1 for Windows
AnyDesk 9.5.1 for ...harlan4096 — 06:07
Messengers 101: safety and privacy advic...
A dozen short and ...harlan4096 — 06:05
Google Docs introduces Audio Overviews t...
Google has announc...harlan4096 — 06:02

[-]
Birthdays
Today's Birthdays
avatar (37)urumahiz
Upcoming Birthdays
avatar (44)wapedDow
avatar (48)oapedDow
avatar (41)Sanchowogy
avatar (45)MeighGoask
avatar (43)techlignub
avatar (42)Stevenmam
avatar (49)onlinbah
avatar (49)fuspeukChark
avatar (43)werriewWaiNg
avatar (37)Freemanleo
avatar (42)cdoubapKit
avatar (37)lystraPonia
avatar (30)smith8395john
avatar (50)steakelask
avatar (44)Termoplenka
avatar (42)bycoPaist
avatar (48)pieloKat
avatar (42)ilyagNeexy
avatar (50)donitascene
avatar (50)Toligo
avatar (45)Rodneykak
avatar (48)tradeSmode
avatar (37)RobertUtelt

[-]
Online Staff
There are no staff members currently online.

>