April 25, 2024, 7:08 p.m. | Kaaviya Ragupathy

Cyber Security News cybersecuritynews.com

Malicious actors are distributing a new backdoor, MadMxShell, through a Google Ads campaign that impersonates an IP scanner. This Windows backdoor leverages DNS MX queries for communication with its command-and-control server.  The technique involves encoding data within subdomains of DNS MX queries to send information to the attacker and receiving commands encoded within the response […]


The post Hackers Exploit Google Ads to Spread IP Scanner with Concealed Backdoor appeared first on Cyber Security News.

ads attacker backdoor campaign command communication control cyber-attack cyber security data dns encoding exploit google google ads hackers hackers exploit information ip scanner madmxshell malicious malicious actors scanner send server subdomains windows

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Security Operations Manager-West Coast

@ The Walt Disney Company | USA - CA - 2500 Broadway Street

Vulnerability Analyst - Remote (WFH)

@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US

Senior Mainframe Security Administrator

@ Danske Bank | Copenhagen V, Denmark