Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: command and control

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic TrendsA conceptual image representing DNS security, such as the strategically aged domain detection system discussed here.
49,671
people reacted

Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Jielong Xu
  • December 29, 2021 at 6:00 AM

42

9 min. read

DNS Rebinding Attack: How Malicious Websites Exploit Private NetworksA conceptual image representing issues with DNS, such as the DNS rebinding discussed here.
69,769
people reacted

DNS Rebinding Attack: How Malicious Websites Exploit Private Networks

  • By Zhanhao Chen
  • August 31, 2021 at 6:00 AM

42

13 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
  • Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege Escalation by Unit 42
Detecting and Preventing Malicious Domains Proactively with DNS SecurityA conceptual image representing malicious domains, such as those that can be identified by the proactive detector discussed in this piece.
40,037
people reacted

Detecting and Preventing Malicious Domains Proactively with DNS Security

  • By Zhanhao Chen and Daiping Liu
  • May 4, 2021 at 6:00 AM

23

11 min. read

Emotet Command and Control Case StudyA conceptual image representing the concept of malware, such as that covered in this case study of Emotet Command and Control traffic.
39,666
people reacted

Emotet Command and Control Case Study

  • By Chris Navarrete and Yanhui Jia
  • April 9, 2021 at 12:00 PM

13

9 min. read

njRAT Spreading Through Active Pastebin Command and Control TunnelThis conceptual image illustrates the idea of malware, such as the njRAT spreading through active Pastebin command and control tunnel that is discussed in this blog.
38,760
people reacted

njRAT Spreading Through Active Pastebin Command and Control Tunnel

  • By Yanhui Jia, Chris Navarrete and Haozhe Zhang
  • December 9, 2020 at 6:00 AM

19

6 min. read

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

  • By Josh Grunzweig, Mike Scott and Bryan Lee
  • May 24, 2016 at 11:30 AM

12

6 min. read

Attacks on East Asia using Google Code for Command and Control

  • By Jen Miller-Osborn
  • August 15, 2014 at 12:00 PM

4

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.