Oct. 18, 2023, 3:05 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

There are a variety of attacks seen from DShield honeypots [1]. Most of the time these commands are human readable. but every now and again they are obfuscated using base64 or hex encoding. A quick look for commands containing the “/x” delimiter give a lot of results encoded in hexadecimal. 


Article Link: https://isc.sans.edu/diary/rss/30322


1 post - 1 participant


Read full topic

attacks base64 dshield encoding hex hexadecimal honeypots human lot obfuscated results

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Architect - Northwest region (Remote)

@ GuidePoint Security LLC | Remote

Senior Consultant, Cyber Security Architecture

@ 6point6 | Manchester, United Kingdom

Junior Security Architect

@ IQ-EQ | Port Louis, Mauritius

Senior Detection & Response Engineer

@ Expel | Remote

Cyber Security Systems Engineer ISSE Splunk

@ SAP | Southbank (Melbourne), VIC, AU, 3006