Remove 2016 Remove DNS Remove Information Security
article thumbnail

Sitting Ducks attack technique exposes over a million domains to hijacking

Security Affairs

Researchers warn of an attack vector in the DNS, called the Sitting Ducks, that exposes over a million domains to hackers’ takeover. Researchers from Eclypsium and Infoblox have identified an attack vector in the domain name system (DNS), dubbed the Sitting Ducks attack. ” continues the report.

DNS 126
article thumbnail

Millions of devices impacted by NAME:WRECK flaws

Security Affairs

Security experts disclosed nine flaws, collectively tracked as NAME:WRECK, affecting implementations of the DNS protocol in popular TCP/IP network communication stacks. CVE-2016-20009 IPnet – stack-based overflow on the message decompression function Message compression RCE 9.8 ” รน.

DNS 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ExCobalt Cybercrime group targets Russian organizations in multiple sectors

Security Affairs

Members of the ExCobalt group have been active since at least 2016, the researchers believe that the group is linked to the notorious Cobalt Gang. For secure communication, operators employ DNS/ICMP tunneling, WSS, and QUIC protocols. The communication between GoRed and its C2 server relies on the RPC protocol.

article thumbnail

Chinese-speaking cybercrime gang Rocke changes tactics

Security Affairs

. “the actor moved away from hosting the scripts on dedicated servers and instead started to use Domain Name System (DNS) text records. These records are accessed via normal DNS queries or DNS-over-HTTPs ( DoH ) if the DNS query fails. “Rocke keeps evolving its TTPs in attempts to remain undetected.

article thumbnail

TrickBot operators employ Linux variants in attacks after recent takedown

Security Affairs

According to a new report published by researchers from security firm Netscout , TrickBot’s operators have started to use a new variant of their malware in an attempt to Linux systems and expand the list of its targets. ” explained Grange. “Often delivered as part of a zip, this malware is a lightweight Linux backdoor. .”

DNS 110
article thumbnail

Microsoft releases open-source tool for checking MikroTik Routers compromise

Security Affairs

TrickBot is a popular Windows banking Trojan that has been around since October 2016, its authors have continuously upgraded it by implementing new features, including powerful password-stealing capabilities. The news wave of attacks aimed at cryptocurrency firms, most of them located in the U.S. Pierluigi Paganini.

Malware 134
article thumbnail

FBI, CISA alert warns of imminent ransomware attacks on healthcare sector

Security Affairs

TrickBot is a popular banking Trojan that has been around since October 2016, its authors have continuously upgraded it by implementing new features. In early 2019, researchers spotted a new TrickBot backdoor framework dubbed Anchor that was using the anchor_dns tool for abusing the DNS protocol for C2 communications.