Get a Pentest and security assessment of your IT network.

Cyber Security

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection

Malware called ‘Pingback’ uses a variety of tricks to stay under the radar and evade detection. Malware leverages Internet Control Message Protocol (ICMP) tunneling for covert bot communications. The malware is capable of executing arbitrary commands on infected systems. Pingback leverages a method called DLL search order hijacking, which involves using a genuine application to preload a malicious DLL file. Researchers: “ICMP tunneling is not new, but this particular sample piqued interest as a real-world example of malware using this technique”

Source: https://thehackernews.com/2021/05/new-pingback-malware-using-icmp.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security