<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>The Rovnix downloader malware is now capable of checking for sinkholing of its domains before connecting to them to evade detection by security tools. This is a new capability not previously observed in malware operations.</p> <!--more--><p>The activity we're seeing with this this latest functionality maps to evasion technology in other malware and exploit kits, that avoids detection by security tools and security professionals.</p> <p>In the case of Rovnix, it will not communicate with its command and control servers if it perceives potential interdiction by security researchers, thus bypassing security measures that rely on behavior-based detection.</p> <p>Information about the Rovnix malware and this new behavior was published recently by McAfee (Intel Security) - more information&nbsp; can be found <a href="https://blogs.mcafee.com/mcafee-labs/rovnix-downloader-sinkhole-time-checks/">here.</a></p> <p>ThreatSTOP customers are protected from Rovnix.</p></span>