Get a Pentest and security assessment of your IT network.

Cyber Security

Emotet Uses Compromised Devices as Proxy Command Servers

A new Emotet Trojan variant has been observed in the wild with the added capabilities of using compromised connected devices as proxy command-and-control servers. Trend Micro’s researchers found out that the new banking Trojan variant uses randomly generated URI directory paths in its POST requests to better blend in with the host’s outgoing web traffic. The new version was detected by Trend Micro while analyzing the malware’s network traffic and discovering that it comes with “different POST-infection traffic”” and that it is also trying to conceal its real C2 servers.”

Source: https://www.bleepingcomputer.com/news/security/emotet-uses-compromised-devices-as-proxy-command-servers/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security