researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism

Preview meta tags from the researchcenter.paloaltonetworks.com website.

Linked Hostnames

28

Thumbnail

Search Engine Appearance

Google

https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.



Bing

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism

Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.



DuckDuckGo

https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.

  • General Meta Tags

    13
    • title
      New Wekby Attacks Use DNS Requests As Command and Control Mechanism
    • charset
      UTF-8
    • viewport
      width=device-width, initial-scale=1
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
    • description
      Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.
  • Open Graph Meta Tags

    25
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      New Wekby Attacks Use DNS Requests As Command and Control Mechanism
    • og:description
      Unit 42 discovers ATP group Wekby using pisloader malware to target US-based organizations.
    • og:url
      https://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/
  • Twitter Meta Tags

    1
    • twitter:card
      summary_large_image
  • Link Tags

    33
    • EditURI
      https://unit42.paloaltonetworks.com/xmlrpc.php?rsd
    • alternate
      https://unit42.paloaltonetworks.com/feed/
    • alternate
      https://unit42.paloaltonetworks.com/comments/feed/
    • alternate
      https://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/feed/
    • alternate
      https://unit42.paloaltonetworks.com/wp-json/wp/v2/posts/13911
  • Website Locales

    3
    • EN country flagen
      https://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/
    • JA country flagja
      https://unit42.paloaltonetworks.com/ja/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/
    • DEFAULT country flagx-default
      https://unit42.paloaltonetworks.com/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/

Emails

1
  • ?subject=New%20Wekby%20Attacks%20Use%20DNS%20Requests%20As%20Command%20and%20Control%20Mechanism&body=Check%20out%20this%20article%20https%3A%2F%2Funit42.paloaltonetworks.com%2Funit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism%2F

Links

150