{ads}

Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks



June 01, 2023 at 09:41PM

An analysis of the "evasive and tenacious" malware known as QBot has revealed that 25% of its command-and-control (C2) servers are merely active for a single day. What's more, 50% of the servers don't remain active for more than a week, indicating the use of an adaptable and dynamic C2 infrastructure, Lumen Black Lotus Labs said in a report shared with The Hacker News. "This botnet has adapted

from The Hacker News https://ift.tt/qWjKzlC

0 Response to "Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks"

Post a Comment

Article Top Ads

Central Ads Article 1

Middle Ads Article 2

Article Bottom Ads