# Copyright (c) 2014-2024 Maltrail developers (https://github.com/stamparm/maltrail/) # See the file 'LICENSE' for copying permission # Reference: https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/ ns1.logitech-usa.com globalprint-us.com intranetwabcam.com login.access-mail.com glb.it-desktop.com local.it-desktop.com hi.getgo2.com