cognitive cybersecurity intelligence

News and Analysis

Search

Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing

IBM X-Force has been monitoring the evolution of Russian threat actor Hive0051’s malware capabilities for the past 18 months, noting significant advances. Key improvements include a multi-channel approach to DNS fluxing, obfuscated multi-stage scripts, and fileless PowerShell versions of Gamma malware. Hive0051’s escalating activity, including an increase in active infections and unique malicious domains, signifies an elevation of resources and ongoing operations.

Source: securityintelligence.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

How to Root Out Malicious Employees

Insider threats pose one of the largest security risks to organizations, and often go unnoticed or unaddressed. Malicious and negligent employees can commit devastating acts,