Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
Thursday, 1 June 2023
Add Comment
An analysis of the "evasive and tenacious" malware known as QBot has revealed that 25% of its command-and-control (C2) servers are merely active for a single day. What's more, 50% of the servers don't remain active for more than a week, indicating the use of an adaptable and dynamic C2 infrastructure, Lumen Black Lotus Labs said in a report shared with The Hacker News. "This botnet has adapted
from The Hacker News https://ift.tt/qWjKzlC
Genrerating Link.... 15 seconds.
Your Link is Ready.
0 Response to "Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks"
Post a Comment