Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

New GameOver Zeus Variant uses FastFlux C&C

$
0
0
Over on the Malcovery Security Blog yesterday we covered a new version of GameOver Zeus (see: GameOver Zeus Mutates, Launches Attack ) that was distributed in three spam campaigns on July 10, 2014. At the bottom of that blog post, we're sharing a detailed "T3 Report" by analysts Brendan Griffin and Wayne Snow that gives all the details. In our reporting yesterday we mentioned that the new bot is using a Fast Flux Command & Control structure and that it is using a Domain Generation Algorithm to allow the malware distributed in the spam to locate and connect to the Command & Control servers.
I wanted to geek that a bit deeper for those who want more details on both of those subjects. First, let's look at the Fast Flux.

more here.............http://garwarner.blogspot.com/2014/07/new-gameover-zeus-variant-uses-fastflux.html

Viewing all articles
Browse latest Browse all 8064

Trending Articles