Common Information
Type | Value |
---|---|
Value |
Domain Generation Algorithms - T1520 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use [Domain Generation Algorithms](https://attack.mitre.org/techniques/T1520) (DGAs) to procedurally generate domain names for command and control communication, and other uses such as malicious application distribution.(Citation: securelist rotexy 2018) DGAs increase the difficulty for defenders to block, track, or take over the command and control channel, as there potentially could be thousands of domains that malware can check for instructions. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-10-31 | 0 | 'Prolific Puma' Hacker Gives Cybercriminals Access to .us Domains | ||
Details | Website | 2023-10-12 | 32 | Analysing a Widespread Microsoft 365 Credential Harvesting Campaign | ||
Details | Website | 2023-10-05 | 31 | RDGAs: The New Face of Domain Generation Algorithms | Infoblox | ||
Details | Website | 2023-09-28 | 1 | Machine Learning in Cybersecurity: Clustering for Threat Detection | ||
Details | Website | 2023-09-15 | 25 | Bumblebee Loader Resurfaces in New Campaign | ||
Details | Website | 2023-08-06 | 0 | DGA Domain Detection with Shannon Entropy Analysis | ||
Details | Website | 2023-08-03 | 6 | Ramnit, Jim, I’m a threat hunter, not a doctor! - DomainTools | Start Here. Know Now. | ||
Details | Website | 2023-06-28 | 2 | Cato Networks Revolutionizes Network Security With Real-Time, Machine Learning-Powered Protection | ||
Details | Website | 2023-06-16 | 2 | Unmasking Malware: Journey into the Digital Abyss (before take-off) | ||
Details | Website | 2023-06-07 | 2 | New Research Shows Bot Attacks Are Surging | ||
Details | Website | 2023-05-17 | 1 | Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework | ||
Details | Website | 2023-04-28 | 1 | 'BellaCiao' Showcases How Iran's Threat Groups Are Modernizing Their Malware | ||
Details | Website | 2023-04-24 | 0 | DNS Layer Security Explained. How It Stops Ransomware and Other Cyberattacks | ||
Details | Website | 2023-04-15 | 6 | What are Advanced Persistent Threats? | ||
Details | Website | 2023-04-11 | 1 | Round-Robin DNS Explained. What It Is and How It Works | ||
Details | Website | 2023-04-03 | 17 | Search | arXiv e-print repository | ||
Details | Website | 2023-03-06 | 0 | What Is Domain Generation Algorithm? Definition and Role in Malware Attacks | ||
Details | Website | 2023-03-03 | 1 | Analyzing Advanced Persistent Threats Using the MITRE ATT&CK Framework: A Case Study of APT10 | ||
Details | Website | 2023-03-02 | 199 | Russia/Ukraine Update - February 2023 | ||
Details | Website | 2023-02-20 | 5 | Search | arXiv e-print repository | ||
Details | Website | 2023-02-13 | 2 | Natively Integrated Security for Palo Alto Networks Ecosystems Cloud Delivered Security Services (CDSS) | ||
Details | Website | 2022-12-20 | 133 | Russia/Ukraine Update - December 2022 | ||
Details | Website | 2022-11-29 | 132 | Russia/Ukraine Update - November 2022 | ||
Details | Website | 2022-09-28 | 0 | The web gains 13 million malicious new domains per month | ||
Details | Website | 2022-07-14 | 21 | The Domain Generation Algorithms of SharkBot |