Get a Pentest and security assessment of your IT network.

News

Fileless Powershell malware uses DNS as covert communication channel

An attack dubbed DNSMessenger was analyzed by researchers from Cisco Systems’ Talos team. The attack starts with a malicious Microsoft Word document distributed through an email phishing campaign. When opened, the file masquerades as a “protected document” secured by McAfee. The script is written in Powershell, a powerful scripting language built into Windows that allows for the automation of system administration tasks. The third stage of the attack contains an additional obfuscated script that establishes a two-way communications channel over the Domain Name System.”]

Source: https://www.csoonline.com/article/3176670/fileless-powershell-malware-uses-dns-as-covert-communication-channel.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months