We’d like to let you know about a report on the crimeware using a fast flux ZBot network.
“A commercially driven fast flux network is facilitating criminal activity such as malware, spam bots, ransomware, carder sites and more…Often, new domains join this botnet only a few days or at most, weeks apart. Some domain names have remained associated with the network for months or years. Parts of the botnet use frequently changing DNS NS records as well as DNS A records. This is generally regarded as “double flux” activity — another layer in hiding the network.”
You can read the full report here: ow.ly/pGEG3012Pe0