A new version of the TDSS/TDL-4 botnet is using an evasion technique known as a domain generation algorithm (DGA) to avoid detection, researchers at Damballa Security revealed today. The algorithm helps the latest version carry out click-fraud campaigns and is used primarily to rapidly move communication between victims and command-and-control servers from domain to domain. In the last week, the botnet has grown 10 percent, the researchers said. The malware has infected more than 4.5 million computers making it one of the most prolific botnets on record.
Source: https://threatpost.com/new-iteration-tdsstdl-4-botnet-uses-domain-fluxing-avoid-detection-091712/77018/

