Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CISA and FBI warn the fast stream of sustainable malware, C2 and phishing networks
Global Security

CISA and FBI warn the fast stream of sustainable malware, C2 and phishing networks

AdminBy AdminApril 7, 2025No Comments3 Mins Read
Fast Flux is Powering Resilient Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


07 April 2025Red LakshmananMalicious software / network safety

Quick Stream - is the nutrition of sustainable malware

Cybersecurity agencies from Australia, Canada, New Zealand and the United States have published joint consultations on the risks related to the technique called Fast flow This was accepted by the actors threatening to obscure the team and control channel (C2).

“” Quick Stream “is a technique used to exacerbate malicious servers through rapidly changing domain names (DNS) associated with one domain name”, agencies – Note. “This threat uses a gap that is commonly found in network protection, making tracking and blocking malicious rapid flow.”

Cybersecurity

Advisory provision is provided by the US Cybersecurity and Infrastructure Agency (CISA), the National Security Agency (NSA), the Federal Investigation Bureau (FBI), the Australian Cybersecurity Center in Australia, the Cybersecurity Center and the National Cyber ​​Security Center.

In recent years, many hacked groups have been taken by a quick stream, including with the participation of the threat Homoredon. Kryptahameleonand Raspine Robin Seeking to make your malicious infrastructure evading the detection and law enforcement agencies.

A approach Essentially, it entails the use of different IP -Drasses and turning them in rapid continuity, pointing to one harmful domain. It was first discovered in the wild in 2007 as part of the Honeynet project.

It can be either a stream where one domain name is related to numerous IP -lines, or double stream, where, in addition to changing IP, the DNS name servers responsible for the domain settlement, are also often changing, offering an extra layer of excess and anonymity for Rogue domains.

“Quick Fast Net” Fast “because, using DNS, it quickly rotates through numerous boots using each one only short to make difficult IP -based efforts and take efforts,” “Palo Alto Networks Unit 42 – Note In a report published in 2021.

Describing rapid flow as a threat to national security, the agencies stated that the threatening subjects use the technique to exacerbate the malicious servers, as well as establish the elastic infrastructure C2, which can withstand the efforts of removal.

Cybersecurity

That’s not all. Fast flow plays a vital role outside the C2 Communications to help the enemy pursuing phishing, as well as the stage and distribute malicious software.

To ensure the rapid flow of organizations, it is recommended to block IP -Drace, malicious sink domains, filter traffic into domains and with IP -residues with poor reputation, implement expanded monitoring and awareness and training of phishing.

“The fast stream is a constant threat to the network safety, using rapidly changing infrastructure to embarrass the harmful activity,” the agencies said. “By introducing reliable detection and mitigation strategies, organizations can significantly reduce the risk of compromise by rapid threat with stream support.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.