DNSpionage campaign releases new Karkoff malware into the wild
#1
Quote:The hacking group behind the DNSpionage campaign have become more choosy in their targets and have released a new form of malware to further their goals.
 
DNSpionage, first discovered in late 2018 by Cisco Talos, utilizes fake websites and specializes in DNS tampering to redirect traffic from legitimate domains to malicious ones. The threat actors also make use of free Let's Encrypt security certificates for redirected domains.
 
Past attacks have been detected against private Lebanese targets including an airline, alongside government domains used by Lebanon and the United Arab Emirates (UAE).
 
The group has now created a new remote administration tool that supports HTTP and DNS communication with their command-and-control (C2) server, according to a new Talos blog post published on Tuesday.

Since the original report, DNSpionage has now revamped its attack methods with a new reconnaissance stage in order to avoid detection by researchers and to create a "fingerprint" for victim systems.

SOURCE: https://www.zdnet.com/article/dnspionage...-the-wild/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Cloudflare CEO warns AI bots could outnu...
The internet you use...schreckdeividas — 11:03
ScreenToGif 2.43.1
ScreenToGif 2.43.1...harlan4096 — 08:55
uBOLite 2026.322.1735 (already available...
uBOLite 2026.322.1...harlan4096 — 08:54
Microsoft outs Windows 11 KB5085516 to f...
This month, Micros...harlan4096 — 08:53
AV-Test - Awards 2025: celebrating the v...
V-TEST Awards 2025...harlan4096 — 08:50

[-]
Birthdays
Today's Birthdays
avatar (44)battsourIonix
avatar (43)CedricSek
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (46)qaqapeti
avatar (43)artmaGoork

[-]
Online Staff
There are no staff members currently online.

>