cognitive cybersecurity intelligence

News and Analysis

Search

MikroTik botnet relies on DNS misconfiguration to spread malware

A 13,000-device MikroTik botnet is spreading malware by exploiting DNS misconfigurations. The malware is delivered via spoofing 20,000 domains and bypassing email protections; the botnet employs MikroTik routers to mask malicious traffic origins and boost the scale of its operations. Researchers have also discovered that botnet operators are exploiting improperly configured DNS records to enable any device to spoof legitimate domains in emails.

Source: securityaffairs.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts