Diamond Member ThaHaka 0 Posted December 11 Diamond Member Share Posted December 11 This is the hidden content, please Sign In or Sign Up Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago. "Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel protocol for C2 communications and an interactive shell This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/181962-h4ckn3wszloader-malware-returns-with-dns-tunneling-to-stealthily-mask-c2-comms/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now