{"id":4633,"date":"2020-02-25T13:52:01","date_gmt":"2020-02-25T13:52:01","guid":{"rendered":"http:\/\/dev.cynance.co\/?p=4633"},"modified":"2020-10-27T14:07:08","modified_gmt":"2020-10-27T14:07:08","slug":"mozarts-new-bitter-symphony","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/mozarts-new-bitter-symphony\/","title":{"rendered":"Mozart’s new bitter symphony"},"content":{"rendered":"
[vc_row][vc_column][vc_column_text css=”.vc_custom_1584453374603{padding-bottom: 50px !important;}”]A new malware named Mozart is using the DNS protocol to communicate with remote attackers to evade detection by security software and intrusion detection systems.<\/p>\n
DNS is a name resolution protocol that is used to convert website names to their IP addresses, so that people can use websites names rather than remembering IP addresses.<\/p>\n
The Mozart attackers use DNS records to store commands, which are retrieved by the malware and then executed on the infected computer.<\/p>\n
The risks associated with such malware could be mitigated using the following methods:
\n– Network intrusion detection and prevention systems that use network signatures and identify potentially malicious behaviour patterns.
\n– Analysing network data for uncommon data flows, such as a client sending significantly more or different types of data than usually.
\n– Analysing communication contents\/ context to detect communications that do not follow the expected protocol behaviour for the port that is being used.
\n– Filtering network traffic, enforcing proxies and using dedicated servers for services, such as DNS and only allow those systems to communicate over respective ports\/ protocols, instead of all systems within a network.<\/p>\n
Cynance<\/a> #Cybersecurity<\/a> #Information security<\/a> #conulting #mitre<\/a> #hacking<\/a> #malware<\/a> #threat hunting<\/a><\/p>\n http:\/\/dev.cynance.co\/threat-hunting\/#1580301933127-4ae3045e-c4b9[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":" A new malware named Mozart is using the DNS protocol to communicate with remote attackers to evade detection by security software and intrusion detection systems.<\/p>\n","protected":false},"author":4,"featured_media":4606,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"_links":{"self":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4633"}],"collection":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/comments?post=4633"}],"version-history":[{"count":0,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4633\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media\/4606"}],"wp:attachment":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media?parent=4633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/categories?post=4633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/tags?post=4633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}