DMSniff POS Malware Uses DGA to Stay Active

DMSniff POS Malware Uses DGA to Stay Active Researchers have discovered a rare strain of POS malware which uses a domain generation algorithm (DGA) to maintain persistence. Flashpoint’s Jason Reaves and Joshua Platt revealed in a blog post that the DMSniff malware may have been in use undetected for as long as four years, targeting small and mid-sized businesses in the restaurant and entertainment sectors.

Read full news article on Infosecurity