Understanding DNS Tunneling Traffic in the Wild

We present our findings on DNS tunneling techniques found in the wild, using extensive data on why this method is selected for malware campaigns.

Unit 42