News

Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies. It can also refer to the ...
Detecting Fast Flux networks "It is relatively easy for a criminal to set up infrastructure using Fast Flux networks, which are difficult to trace." ...
Fast-flux helps cybercriminals hide their content servers, including everything from fake online pharmacies, phishing sites, money mules, and adult content sites, Logan says.
However, after four weeks of tracking sites that had all the earmarks of being Rock Phish attacks, the fast-flux method started showing up in phishing reports, he said. “They were burning ...
"Quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics, ...
Researchers at Akamai have identified a botnet of over 14,000 IP addresses used in malware distribution operations. The botnet is still up and running, and experts believe it will be hard to take ...
Fast-flux was embraced by the malicious parties around the middle of 2007, when managed fast-flux providers appeared, and more spam and phishing domains were set in a fast-flux mode.
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Lots of bad guys, that’s who. In the latest version ...
Fast-flux is a DNS technique that distributes command-and-control by constantly reallocating the servers controlling peer-to-peer botnets. It makes those servers difficult to identify and shut ...