← Back to Labs
← Volver a Labs
Medium
CyberCrime, Malware
Command and Control, Defense Evasion, Execution
Cloud

When Malicious Traffic Blends In: Trojan-Proxies Leveraging DNS Over HTTPS for Stealth

Protocol tunneling enables malware and threat actors to stealthily communicate with their command-and-control (C2) servers by encapsulating malicious traffic within legitimate protocols, helping evade detection. In the past few months, we have detected several weaponized software with a trojan-proxy capable of solving C2 server via DoH (DNS over HTTPS) making malicious traffic indistinguishable from legitimate HTTPS web traffic.

labs correlati

Contacts

Get in touch with us

Contact Us
chevron-right