Get a Pentest and security assessment of your IT network.

Cyber Security

LoJax Command and Control Domains Still Active

Security researchers have uncovered new details about the infrastructure used by LoJax UEFI rootkit used in attacks from APT28. The analysis revealed two command and control (C2) servers were still active in early 2019. The research mapped some IP addresses the UK’s National Cyber Security Center (NCSC) gave as indicators of compromise for malware used by FAncy bear in a report in October of last year. Some of the domains were not encountered in the wild, and some of them have not been seen in LoJAX samples. Two of them were still pointing to live C2 servers in 2019.

Source: https://www.bleepingcomputer.com/news/security/lojax-command-and-control-domains-still-active/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security