Tag: Command And Control
-
Doki Backdoor Infiltrates Docker Servers in the Cloud
A fresh Linux backdoor called Doki is infesting Docker servers in the cloud, researchers warn, employing a brand-new technique: Using a …
-
Self-Propagating Lucifer Malware Targets Windows Systems
Security experts have identified a self-propagating malware, dubbed Lucifer, that targets Windows systems with cryptojacking and …
-
Anomaly in pen-test tool made malware servers visible
For four years, a security company was able to track command and control (C&C) traffic generated by several well-known hacking groups …
-
Advanced Malware Command and Control
Reuters wrote an interesting group of articles on Karma (a rootkit for iOS) and Project Raven (a group of ex-NSA contractors and employees …
-
Massive botnet chews through 20,000 WordPress sites
Attackers have infected 20,000 WordPress sites by brute-forcing administrator usernames and passwords. They are then using those sites to …
-
Malware Command and Control Without HTTP
Malware frequently uses HTTP for communication, but it’s not the only option. Neither is TCP the only IP protocol we can …
-
How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: Blockchain Infrastructure Use
This blog covers the growing trend of cyber criminals using blockchain domains for malicious infrastructure. Blockchain Infrastructure Use …
-
A Quick Tor Primer
So Tor can be used by malware authors to hide, command, and control traffic. It’s not that common, but it is becoming more popular as a …
-
Malware Command and Control
One thing almost all malware has in common (especially more advanced varieties) is robust command and control infrastructure. Ironically, …
●●●