New XLoader Botnet Version Using Probability Theory to Hide its C&C Servers
An enhanced version of the XLoader malware has been spotted adopting a probability-based approach to camouflage its command-and-control (C&C) infrastructure, according to the latest research. "Now it is significantly harder to separate the wheat from the chaff and discover the real C&C servers among thousands of legitimate domains used by Xloader as a smokescreen," Israeli cybersecurity company
from The Hacker News https://ift.tt/ENMxIB4
via IFTTT
from The Hacker News https://ift.tt/ENMxIB4
via IFTTT
Comments
Post a Comment