DNSpionage campaign releases new Karkoff malware into the wild
#1
Quote:The hacking group behind the DNSpionage campaign have become more choosy in their targets and have released a new form of malware to further their goals.
 
DNSpionage, first discovered in late 2018 by Cisco Talos, utilizes fake websites and specializes in DNS tampering to redirect traffic from legitimate domains to malicious ones. The threat actors also make use of free Let's Encrypt security certificates for redirected domains.
 
Past attacks have been detected against private Lebanese targets including an airline, alongside government domains used by Lebanon and the United Arab Emirates (UAE).
 
The group has now created a new remote administration tool that supports HTTP and DNS communication with their command-and-control (C2) server, according to a new Talos blog post published on Tuesday.

Since the original report, DNSpionage has now revamped its attack methods with a new reconnaissance stage in order to avoid detection by researchers and to create a "fingerprint" for victim systems.

SOURCE: https://www.zdnet.com/article/dnspionage...-the-wild/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Microsoft promises faster Windows 11, f...
Windows 11 Update Br...harlan4096 — 12:07
ScreenToGif 2.43
ScreenToGif 2.43 ...harlan4096 — 07:37
Microsoft Edge 146.0.3856.72
Version 146.0.3856...harlan4096 — 07:35
Brave 1.88.134 (Chromium 146.0.7680.153)
Release v1.88.134 ...harlan4096 — 07:34
Vivaldi 7.9 Build 3970.41
Vivaldi 7.9 Build ...harlan4096 — 07:33

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (43)artmaGoork

[-]
Online Staff
There are no staff members currently online.

>