Get a Pentest and security assessment of your IT network.

News

New Iteration of TDSS/TDL-4 Botnet Uses Domain Fluxing to Avoid Detection

A new version of the TDSS/TDL-4 botnet is using an evasion technique known as a domain generation algorithm (DGA) to avoid detection, researchers at Damballa Security revealed today. The algorithm helps the latest version carry out click-fraud campaigns and is used primarily to rapidly move communication between victims and command-and-control servers from domain to domain. In the last week, the botnet has grown 10 percent, the researchers said. The malware has infected more than 4.5 million computers making it one of the most prolific botnets on record.

Source: https://threatpost.com/new-iteration-tdsstdl-4-botnet-uses-domain-fluxing-avoid-detection-091712/77018/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

IntelCrawler profiled Syrian Electronic Army group

News

Wikileaks Vault 7 Imperial projects revealed the 3 hacking tools Achilles, SeaPea and Aeris