Get a Pentest and security assessment of your IT network.

News

Astaroth Trojan Employed YouTube Channels as C&C to Evade Detection

A new variant of the Astaroth Trojan family employed YouTube channels for command-and-control (C&C) functionality in order to evade detection. The operation leveraged multiple layers of obfuscation before using LoLBins to advance itself. It then employed evasion checks and anti-analysis processes, steps that included the use of YouTube channels as its primary C&C infrastructure. Security professionals can help defend their organizations against evasive malware by training their machine learning (ML) models to spot evasive tactics.”]

Source: https://securityintelligence.com/news/astaroth-trojan-employed-youtube-channels-as-cc-to-evade-detection/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Thousands of Magento websites compromised to serve malware

News

Office 365 Secure Score: An Introduction