Unmasking Decoy Dog Malware Toolkit Hiding in DNS Traffic

Threat Level – Amber | Vulnerability Report
Download PDF

Decoy Dog, a sophisticated malware toolkit uses DNS for C2 communication, evading detection with its wildcard-type behavior and encryption methods. Its origin remains mysterious, and the malware’s capabilities surpass traditional RATs like Pupy, making it highly elusive.

To receive real-time threat advisories, please follow HiveForce Labs on LinkedIn.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox