Researchers at Arbor Networks, the security division of Netscout, recently managed to crack the heavy obfuscated domain generation algorithm (DGA) of Mad Max, a targeted Trojan that has created a botnet of infected machines in sixteen countries.
The malware itself hasn’t been detailed as of now, but researchers did manage to find all of the domains that the threat has connected to since the beginning of 2015, as well as those it is supposed to use until the end of 2017. The Trojan’s analysis revealed some details on its features, installation life cycle, and other characteristics, but Arbor’s researchers plan on publishing these details at a later date.
Original Source: Security Week
View the full story here here