Get a Pentest and security assessment of your IT network.

News

Astaroth Trojan Employed YouTube Channels as C&C to Evade Detection

A new variant of the Astaroth Trojan family employed YouTube channels for command-and-control (C&C) functionality in order to evade detection. The operation leveraged multiple layers of obfuscation before using LoLBins to advance itself. It then employed evasion checks and anti-analysis processes, steps that included the use of YouTube channels as its primary C&C infrastructure. Security professionals can help defend their organizations against evasive malware by training their machine learning (ML) models to spot evasive tactics.”]

Source: https://securityintelligence.com/news/astaroth-trojan-employed-youtube-channels-as-cc-to-evade-detection/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Botnet authors use Evernote account as C&C Server

News

Canadian agency breached as hackers exploit CVE-2017-5638 flaw in Apache Struts 2