Get a Pentest and security assessment of your IT network.

Cyber Security

New Norman Cryptominer Uses Dynamic DNS for C2 Communication

A new cryptominer malware that infected almost all the computers on a company’s network within a year uses DuckDNS for command and control (C2) communications with its masters. The new miner malware strain dubbed Norman by the Varonis Security Research team was discovered while actively mining for Monero using the computing resources of the infected workstations and servers as directed by its operators. Norman is dropped on the targets’ systems using a malware dropper compiled using the Nullsoft Scriptable Install System (NSIS) and designed to execute the payload according to instructions.

Source: https://www.bleepingcomputer.com/news/security/new-norman-cryptominer-uses-dynamic-dns-for-c2-communication/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security