[dns-operations] Malware Increasingly Uses DNS as Command and Control Channel to Avoid Detection, Experts Say
Francisco J. Gómez Rodríguez
ffranz at iniqua.com
Fri Mar 9 06:29:10 UTC 2012
Thanks Hugo for the references.
Besides few days ago we have presented a continuation of work presented a
year ago. It's include a Data-leak over DNS that complement DNS malware
distribution showed last year. Also we are going to release a 'flu' (an
open source trojan) version that uses DNS as communication protocol.
*@**ffranz* (cc) 2012
On Fri, Mar 9, 2012 at 12:06 AM, Hugo Salgado <hsalgado at nic.cl> wrote:
> On 03/08/2012 11:00 AM, Stephane Bortzmeyer wrote:
> > Anyone has details, published results, etc?
> Don't know if it's the same, but last year there was a study using
> "open emitters" (free and "unauthorized" use of subdomains) and open
> resolvers to distribute malware:
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> dns-jobs mailing list
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the dns-operations