Because it's always DNS, we wanted to share this fun finding of malware stored across DNS TXT records.| DomainTools Investigations | DTI
Asher Falcon's personal website - Software engineer and student| asherfalcon.com
Delivered by “secure” Word doc, pure PowerShell malware fetches commands from DNS TXT records.| Ars Technica
Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. A journalist with more than 25…| Ars Technica
Technique transforms the Internet DNS into an unconventional file storage system.| Ars Technica
4.93K Posts, 1.14K Following, 15K Followers · Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.| Infosec Exchange
Cybersecurity Reporter, Ars Technica: https://arstechnica.com/author/dan-goodin/ Hungry for tips. Text me on Signal: DanArs.82. "The world isn’t run by weapons anymore, or energy, or money. It’s run by little 1s and 0s, little bits of data."| Bluesky Social