article thumbnail

Lyceum.NET DNS Backdoor

Security Boulevard

Active since 2017, Lyceum group is a state-sponsored Iranian APT group that is known for targeting Middle Eastern organizations in the energy and telecommunication sectors and mostly relying on.NET based malwares. The threat actor then leverages the AutoClose() function to drop the DNS backdoor onto the system. Lyceum.NET DNS backdoor.

DNS 98
article thumbnail

How Cobalt Strike Became a Favorite Tool of Hackers

eSecurity Planet

The Cobalt Strike’s Command and Control protocol is a DNS-based communication that is pretty hard to detect compared to classic HTTP traffic. It’s a pretty clever way to hide malicious instructions using DNS entries and some obfuscation algorithm the Beacon can decode. While that’s true, it requires time, effort, and energy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BlindEagle flying high in Latin America

SecureList

They have been targeting entities in multiple sectors, including governmental institutions, financial companies, energy and oil and gas companies, among others. Dynamic DNS services utilized for resolving the addresses of servers hosting the group’s malicious artifacts.

Phishing 133
article thumbnail

Research Uncovers Massive Number of IoT and IIoT Vulnerabilities

SecureWorld News

An attacker may utilize affected device as a way to remain hidden within the network for years. This can be done by performing a MITM attack or a DNS cache poisoning. How did Ripple20 vulnerabilities become so widespread? An attacker could broadcast an attack capable of taking over all impacted devices in the network simultaneously.

IoT 64
article thumbnail

IT threat evolution Q3 2021

SecureList

We have seen targeted attacks exploiting the vulnerability to target companies in research and development, the energy sector and other major industries, banking, the medical technology sector, as well as telecoms and IT. That library was then loaded by the legitimate MsMpEng.exe by utilizing the DLL side-loading technique.

Malware 135
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. More robust security for Domain Name Systems (DNS). Utilizing their open standard Blokcerts, companies can transparently manage identities and activity on a real-time secure blockchain.

article thumbnail

Kali Linux Penetration Testing Tutorial: Step-By-Step Process

eSecurity Planet

You may use a VPN or install utilities to capture and forward traffic to other subnets, or configure proxychains. Besides, attacking tools can send multiple probes or headers along with their requests (e.g., during scanning and discovery), which can be detected and blocked by security tools.