
researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism
Preview meta tags from the researchcenter.paloaltonetworks.com website.
Linked Hostnames
28- 65 links towww.paloaltonetworks.com
- 48 links tounit42.paloaltonetworks.com
- 8 links toblog.paloaltonetworks.com
- 2 links tostart.paloaltonetworks.com
- 2 links totwitter.com
- 2 links towww.facebook.com
- 2 links towww.linkedin.com
- 1 link toautofocus.paloaltonetworks.com
Thumbnail

Search Engine Appearance
https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism
New Wekby Attacks Use DNS Requests As Command and Control Mechanism
Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.
Bing
New Wekby Attacks Use DNS Requests As Command and Control Mechanism
https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism
Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.
DuckDuckGo

New Wekby Attacks Use DNS Requests As Command and Control Mechanism
Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.
General Meta Tags
13- titleNew Wekby Attacks Use DNS Requests As Command and Control Mechanism
- charsetUTF-8
- viewportwidth=device-width, initial-scale=1
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- descriptionUnit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.
Open Graph Meta Tags
25og:locale
en_US- og:typearticle
- og:titleNew Wekby Attacks Use DNS Requests As Command and Control Mechanism
- og:descriptionUnit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.
- og:urlhttps://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/
Twitter Meta Tags
1- twitter:cardsummary_large_image
Link Tags
33- EditURIhttps://unit42.paloaltonetworks.com/xmlrpc.php?rsd
- alternatehttps://unit42.paloaltonetworks.com/feed/
- alternatehttps://unit42.paloaltonetworks.com/comments/feed/
- alternatehttps://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/feed/
- alternatehttps://unit42.paloaltonetworks.com/wp-json/wp/v2/posts/13911
Website Locales
3en
https://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/ja
https://unit42.paloaltonetworks.com/ja/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/x-default
https://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/
Emails
1- ?subject=New%20Wekby%20Attacks%20Use%20DNS%20Requests%20As%20Command%20and%20Control%20Mechanism&body=Check%20out%20this%20article%20https%3A%2F%2Funit42.paloaltonetworks.com%2Funit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism%2F
Links
150- https://autofocus.paloaltonetworks.com/#/tag/Unit42.Pisloader
- https://blog.airbuscybersecurity.com/post/2014/01/PlugX-v2%3A-meet-SController
- https://blog.anomali.com/evasive-maneuvers-the-wekby-group-attempts-to-evade-analysis-via-custom-rop
- https://blog.cj2s.de/archives/28-Feederbot-a-bot-using-DNS-as-carrier-for-its-CC.html
- https://blog.gdatasoftware.com/2014/10/23942-new-frameworkpos-variant-exfiltrates-data-via-dns-requests