DNS Tunneling in the Wild: Overview of OilRig’s DNS Tunneling
On March 15, Unit 42 published a blog providing an overview of DNS tunneling and how malware can use DNS queries and answers to act as a command and control channel. To supplement this blog, we have decided to describe a collection of tools that rely on DNS tunneling used by an adversary known as OilRig.
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed