Threat Advisories:
🎧 Podcast: This Month's Threats in 10 Min! Emerging Threat Intel Audio Briefing - Listen & Defend Now →
👥 Play Count: Loading...

Unmasking Decoy Dog Malware Toolkit Hiding in DNS Traffic

Threat Level – Amber | Vulnerability Report
Download PDF

Decoy Dog, a sophisticated malware toolkit uses DNS for C2 communication, evading detection with its wildcard-type behavior and encryption methods. Its origin remains mysterious, and the malware’s capabilities surpass traditional RATs like Pupy, making it highly elusive.

To receive real-time threat advisories, please follow HiveForce Labs on LinkedIn.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox