<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">
Call Us: (855) 695-8200

dissecting domain generation algorithms

eight real world dgas variants

Domain generation algorithms have become the primary method attackers use to communicate with the malicious tools they’ve created. DGAs are easy to implement, difficult to block, can be impossible to predict in advance and can be quickly modified if the previously used algorithm becomes known. They’re the perfect tool for establishing command and control communication. In this Cybereason Lab Analysis, learn how Cybereason detected new DGA variants that had infiltrated our customer networks.

This Cybereason Lab Analysis Report dissects DGA variants found in our customer’s networks and:

  • Reviews the similarities and differences between the variants
  • Discusses the challenges of detecting and blocking the variants
  • Discusses an alternative approach to DGA detection that focuses on the malware's behavior