Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

FBI investigates hacking into wiretapping and surveillance systems: report

The US is reportedly considering a complete repeal of new chip export restrictions.

BYD launches EV battery with 5-minute “flash charge” function – but there’s a catch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA and FBI WARN FAST FLUX are powered by resilient malware, C2 and phishing networks
Identity

CISA and FBI WARN FAST FLUX are powered by resilient malware, C2 and phishing networks

userBy userApril 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 7, 2025Ravi LakshmananMalware/Network Security

Fast flux powers resilient malware

Cybersecurity agencies in Australia, Canada, New Zealand and the US have released a joint advisory on risks related to a method called FAST flux employed by threat defenders.

“Fast Flux is a technique used to obfuscate malicious server locations via rapidly changing domain name system (DNS) records associated with a single domain name,” the agency said. “This threat exploits the gaps commonly found in network defense, making it difficult to track and block malicious high-speed flux activity.”

Cybersecurity

This consultation is provided by the United States Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Investigation Agency (FBI), Australian Cybersecurity Centre of the Australian Signals Agency, Canada’s Cybersecurity Centre, and New Zealand’s National Cybersecurity Centre.

Fast Flux has been adopted by many hacking groups, including threat actors associated with Gummerderson, Cryptochameleon and Raspberry Robin, and strives to avoid malicious infrastructure and takedowns for law enforcement.

This approach involves using essentially different IP addresses to quickly rotate them consecutively while pointing to one malicious domain. It was first detected in Wild in 2007 as part of the Honeynet project.

If it’s a single flux and a single domain name is linked to many IP addresses or is Double Flux, in addition to changing the IP address, the DNS name server that resolves the domain is also frequently changed, providing an additional layer of redundancy and anonymity for the Rogue domain.

“High-speed flux networks are “fast.” Because using DNS, it quickly spins many bots, each of which makes it difficult to use in a short time to make IP-based denilist and takedown efforts difficult.”

The agency describing high-speed flux as a national security threat said it has used the technique to establish a resilient C2 infrastructure that can obfuscate malicious server locations and withstand takedown efforts.

Cybersecurity

That’s not all. Fast Flux plays an important role beyond C2 communication, helping enemies host phishing websites and helping them set up and distribute malware.

Organizations are recommended to block IP addresses, sloppy malicious domains, filter out traffic with poorly-reputed domains, enhance surveillance, and implement phishing awareness and training to ensure fast flux.

“Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity,” the agency said. “By implementing robust detection and mitigation strategies, organizations can significantly reduce the risk of compromise through the threat of fast flux response.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSerbian President Vic taps novice prime minister amid protest pressure | News
Next Article Why did Trump cancel all his South Sudan visas? | Donald Trump News
user
  • Website

Related Posts

Post-Quantum Cryptography Webinar for Security Leaders

March 5, 2026

Cisco confirms active exploitation of two vulnerabilities in Catalyst SD-WAN Manager

March 5, 2026

DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

March 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

FBI investigates hacking into wiretapping and surveillance systems: report

The US is reportedly considering a complete repeal of new chip export restrictions.

BYD launches EV battery with 5-minute “flash charge” function – but there’s a catch

Official announcement: Department of Defense has classified Anthropic as a supply chain risk

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.