Threat actors are modifying Domain Generation Algorithm (DGA) patterns to improve command and control (C2) communication and complicate analysis. DGAs generate random domain names for malware C&C servers, making it difficult for victims to block or remove them. Akamai Security Intelligence Group has observed threat actors altering DGA patterns, with domain names activating ahead of schedule. This makes it challenging for researchers to disrupt C2 communication and block malicious domains. Additionally, DGAs have enabled the development of various cyber threats, including DDoS attacks, cryptomining, and malware spreading. Statically seeded DGAs use unchanging seeds like numbers or names, while dynamically seeded DGAs use time-based seeds, making it difficult to predict domain names. Pushdo and Necurs are among the DGA families that have been examined by cybersecurity analysts. Malicious actors alter DGAs to evade detection and challenge security teams. Stay informed about cyber security news. #CyberSecurity #DGAPatterns #C2Communication #MalwareThreatActors

https://cybersecuritynews.com/threat-actors-alter-dga-patterns/

Reply to this note

Please Login to reply.

Discussion

No replies yet.