Source |
The Hacker News |
Identifiant |
8623490 |
Date de publication |
2024-12-11 19:37:00 (vue: 2024-12-11 15:08:02) |
Titre |
ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms |
Texte |
Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago.
"Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel protocol for C2 communications and an interactive shell
Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago.
"Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel protocol for C2 communications and an interactive shell |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
actors adds after ago are command comms communications continuing control custom cybersecurity discovered dns domain employs have improvements including indicating interactive malware mask name new notable protocol refine researchers resurfacing returns shell stealthily system threat tool tunnel tunneling version year zloader |
Tags |
Malware
Tool
Threat
|
Stories |
|
Move |
|