Get a Pentest and security assessment of your IT network.

Cyber Security

Attackers abuse Google DNS over HTTPS to download malware

Researchers at MSP threat detection provider Huntress Labs noticed a suspicious URL in the PowerShell code they had previously analyzed:https://dns.google.com/resolve?name=dmarc.jqueryupdatejs.com&type=txt. The response returned via Google DNS contains the malicious payload in an encoded form, as verified by BleepingComputer:Google DNS response with the “data”” field containing the malicious malicious payload. The apparent hexadecimal characters on the right side are actually decimal characters used to construct an encoded payload via rogue scheduled tasks. In addition to the obfuscation techniques it uses to “”hide all of its evasive malware under layers under layers of complexity”””

Source: https://www.bleepingcomputer.com/news/security/attackers-abuse-google-dns-over-https-to-download-malware/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security