Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Glimpse malware uses alternative DNS to evade detection
#1
Quote:Security researchers have detailed how the Glimpse malware uses a text mode as an alternative DNS resource record type.
According to a blog post by security researchers Jon Perez and Jonathan Lepore at IronNet, the malware is written in PowerShell and associated with APT34. It is executed by Visual Basic script, yet how the script is initiated remains unclear, researchers said.
They added that the malware is similar to the PoisonFrog malware. Both use "A" resource records to communicate with their controller. Glimpse differs by its ability to use text mode as an alternative DNS resource record type. This allows it to provide tasking in fewer transactions. Additionally, instead of relying on existing .NET DNS libraries, it manually crafts its DNS queries and communicates directly with the controller.


Source(full read)-https://www.scmagazineuk.com/glimpse-mal...le/1665336
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  New malware DarkWatchman uses Windows Registry to evade detection mrtrout 0 1,118 12-25-2021 , 12:23 AM
Last Post: mrtrout
  Maze ransomware now encrypts via virtual machines to evade detection mrtrout 0 932 09-19-2020 , 08:30 AM
Last Post: mrtrout
  Malware Coders Find the Perfect Technique to Help RATs Avoid Detection baziroll 0 2,402 04-22-2016 , 10:25 PM
Last Post: baziroll
  New technique allows Trojans to remain in memory to evade detection baziroll 0 1,849 04-21-2016 , 10:25 PM
Last Post: baziroll

Forum Jump:


Users browsing this thread: 1 Guest(s)