Research Spotlight: Detecting Algorithmically Generated Domains
This post was authored by Mahdi Namazifar and Yuxi Pan Once a piece of malware has been successfully installed on a vulnerable system one of the first orders of business is for the malware to reach out to the remote command-and-control (C&C) servers in order to receive further instructions, updates and/or to exfiltrate valuable user data. If the rendezvous points with the C&C servers are hardcoded in the malware the communication can be effectively cut off by blacklisting, which limits [...]
from Cisco Blog » Security http://ift.tt/1Uw1fCc
from Cisco Blog » Security http://ift.tt/1Uw1fCc