DNSMessenger backdoor/RAT uses DNS queries to communicate with C&C server
How to make sure that your malware will be able to communicate with its C&C servers even if the infected machine sits behind a company firewall and traffic to and from the corporate network is regularly inspected? Pack the needed information into DNS traffic. For one thing, DNS traffic is very rarely blocked, as it is needed to allow users to access network resources by name (instead by IP addresses). Secondly, DNS traffic monitoring and … More → Continue reading DNSMessenger backdoor/RAT uses DNS queries to communicate with C&C server