Hide and Seek in TXT Records
18. September 2020
Did you ever wondered how the “bad guys” cover things?
Some time ago John Ferrell wrote about how to hide malicious code in files looking like a good old plain text log file. Last month (August 2020) John Hammond wrote a part two. In this part he’s showing how they download additional payloads from the internet under the radar. It’s quite simple, if you know.
What’s the Problem with Payloads So if you are writing malware you face the same problem as any software developer: You want to ship updates.…