New XLoader Botnet Version Using Probability Theory to Hide its C&C Servers

This article has been indexed from

The Hacker News

An enhanced version of the XLoader malware has been spotted adopting a probability-based approach to camouflage its command-and-control (C&C) infrastructure, according to the latest research.
“Now it is significantly harder to separate the wheat from the chaff and discover the real C&C servers among thousands of legitimate domains used by Xloader as a smokescreen,” Israeli cybersecurity company

Read the original article: