June 1, 2022, 10:16 a.m. | noreply@blogger.com (Ravie Lakshmanan)

The Hacker News thehackernews.com

An enhanced version of the XLoader malware has been spotted adopting a probability-based approach to camouflage its command-and-control (C&C) infrastructure, according to the latest research.
"Now it is significantly harder to separate the wheat from the chaff and discover the real C&C servers among thousands of legitimate domains used by Xloader as a smokescreen," Israeli cybersecurity company

botnet hide servers theory version xloader

Technical Support Engineer - Cyber Security

@ Microsoft | Taipei, Taipei City, Taiwan

Senior Security Engineer

@ Workato | Barcelona, Spain

Regional Cybersecurity Specialist

@ Bayer | Singapore, Singapore, SG

Cyber Security Network Engineer

@ Nine | North Sydney, Australia

Professional, IAM Security

@ Ingram Micro | Manila Shared Services Center

Principal Windows Threat & Detection Security Researcher (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel