Swiss CERT cracked the Tofsee botnet DGA

The Tofsee botnet domain generation algorithm has been cracked by the Swiss Governmental Computer Emergency Response Team. The CERT states that the malware sample was found in their malware zoo, and that they decided to take a closer look at the malware sample as it was showing DGA behavior.

During their research, they were able to create a list of domains which will be used by the Tofsee botnet. The domains which were generated, will allow the CERT and all the companies that have the IOCs to track the Tofsee botnet for 52 weeks.