An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?
3bc35a7
3 months, 2 weeks agoBionicBeaver
1 year, 3 months agoAnzk
1 year, 3 months ago