Global CyberSecurity

From Google DNS to Tech Support Scam Sites: Unmasking the Malware Trail

0

Last Updated on 08/11/2023 by OTC

A vast majority of website malware employ the ever-familiar HTTP/HTTPS protocols for its malicious activities. But, we also periodically confront more interesting hybrid malware leveraging various other internet protocols. For example, malware sending email spam, DDoS tools creating floods of UDP packets, bruteforce tools trying to guess SSH credentials, phishing and credit card skimming malware exfiltrating data via web sockets, telegram bots — the list goes on.

During a recent investigation, we encountered a rather interesting piece of JavaScript malware that indirectly uses the DNS protocol to obtain redirect URLs.

Continue reading From Google DNS to Tech Support Scam Sites: Unmasking the Malware Trail at Sucuri Blog.

Russian Forces Deploy in Ukraine Armored Trains Protected by BMP 2 IFV Mounted on Railway Car

Previous article

What we can expect at WDS World Defense Show 2024 exhibition in Riyadh Saudi Arabia

Next article

You may also like

Comments

Comments are closed.