Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns

You may be inhaling 68,000 microplastic particles every day

Protecting the Python Supply Chain in 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA and FBI WARN FAST FLUX are powered by resilient malware, C2 and phishing networks
Identity

CISA and FBI WARN FAST FLUX are powered by resilient malware, C2 and phishing networks

userBy userApril 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 7, 2025Ravi LakshmananMalware/Network Security

Fast flux powers resilient malware

Cybersecurity agencies in Australia, Canada, New Zealand and the US have released a joint advisory on risks related to a method called FAST flux employed by threat defenders.

“Fast Flux is a technique used to obfuscate malicious server locations via rapidly changing domain name system (DNS) records associated with a single domain name,” the agency said. “This threat exploits the gaps commonly found in network defense, making it difficult to track and block malicious high-speed flux activity.”

Cybersecurity

This consultation is provided by the United States Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Investigation Agency (FBI), Australian Cybersecurity Centre of the Australian Signals Agency, Canada’s Cybersecurity Centre, and New Zealand’s National Cybersecurity Centre.

Fast Flux has been adopted by many hacking groups, including threat actors associated with Gummerderson, Cryptochameleon and Raspberry Robin, and strives to avoid malicious infrastructure and takedowns for law enforcement.

This approach involves using essentially different IP addresses to quickly rotate them consecutively while pointing to one malicious domain. It was first detected in Wild in 2007 as part of the Honeynet project.

If it’s a single flux and a single domain name is linked to many IP addresses or is Double Flux, in addition to changing the IP address, the DNS name server that resolves the domain is also frequently changed, providing an additional layer of redundancy and anonymity for the Rogue domain.

“High-speed flux networks are “fast.” Because using DNS, it quickly spins many bots, each of which makes it difficult to use in a short time to make IP-based denilist and takedown efforts difficult.”

The agency describing high-speed flux as a national security threat said it has used the technique to establish a resilient C2 infrastructure that can obfuscate malicious server locations and withstand takedown efforts.

Cybersecurity

That’s not all. Fast Flux plays an important role beyond C2 communication, helping enemies host phishing websites and helping them set up and distribute malware.

Organizations are recommended to block IP addresses, sloppy malicious domains, filter out traffic with poorly-reputed domains, enhance surveillance, and implement phishing awareness and training to ensure fast flux.

“Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity,” the agency said. “By implementing robust detection and mitigation strategies, organizations can significantly reduce the risk of compromise through the threat of fast flux response.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSerbian President Vic taps novice prime minister amid protest pressure | News
Next Article Why did Trump cancel all his South Sudan visas? | Donald Trump News
user
  • Website

Related Posts

Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns

August 1, 2025

Protecting the Python Supply Chain in 2025

August 1, 2025

Storm-2603 deploys DNS-controlled backdoors to Warlock and Lockbit ransomware attacks

August 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Malicious NPM packages generated by AI will emit Solana funds from over 1,500 before takedowns

You may be inhaling 68,000 microplastic particles every day

Protecting the Python Supply Chain in 2025

Ford UK has secured £1 billion government loans to promote EV production

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.