ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago.
“Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel protocol for C2 communications and an interactive shell”}]] – Read More – The Hacker News