PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

NSA Warns Fast Flux Technique Makes Cybercriminals a National Security Threat

By Wesley Grant
April 3, 2025
in Analysts Coverage, Cybersecurity, Fraud & Security
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
fast flux

Computer scientists in data center managing and maintaining databases, ensuring data integrity and security. IT staff members updating server room systems using, camera B

The United States National Security Administration (NSA) has issued a cybersecurity advisory about fast flux, a technique commonly used by cybercriminals to avoid detection.

Fast flux allows bad actors to rapidly change the IP address associated with a domain name. The NSA said that because fast flux allows cybercriminals and nation-state actors to create highly resilient and available command-and-control infrastructures that obfuscate their activities, it poses a threat to national security.

This infrastructure can be exploited to conduct espionage and hide other cyberattacks, like phishing campaigns and distributed denial-of-service (DDoS) attempts. For example, a group known as Gamaredon, which is believed to be linked to Russia, recently used fast flux to conceal spear-phishing attacks against Ukrainian organizations.

What is particularly concerning about this incident is that even though the group’s attacks have been described as “reckless and not particularly focused on stealth,” the threats have still managed to evade detection by leveraging techniques like fast flux.

Cyber Fusion Deployment

This is part of a growing trend where sophisticated technology is lowering the barriers to entry for criminals. Often, bad actors use phishing attacks to gain access to an organization’s systems, after which they can deploy various forms of malware.

As cybercriminals become more cunning and creative, organizations must adapt by expanding their cybersecurity strategies.

“The best defense for financial institutions, and any critical infrastructure industry, is to ensure that threat intel sharing is brought to the fore, through information sharing and analysis center (ISAC) participation and consortium efforts facilitated via private sector collaboration,” said Tracy Goldberg, Director of Fraud & Security at Javelin Strategy & Research.

“The DDoS attacks (waged against the U.S. by the Iranian government) of the mid-2010s took top-tier banking institutions offline,” she said. “It was only after strong intel sharing—facilitated by ISAC participation—around suspicious IP addresses and domains became commonplace that U.S. banks were able to successfully mitigate those attacks. A similar strategy is required here, heightening the need for more cyber-fusion deployment across the financial services sector.”

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: CyberCyber FusionCybercriminalsCybersecurityDDoSFast FluxMalwareNSAPhishing

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    automotive collections

    Reducing Friction in Automotive Collections

    May 6, 2026
    payment cards as customer experience

    From Hygiene Factor to Hero Product: Why the Card Deserves a Second Look

    May 5, 2026
    cobrand credit card

    Co-Branded Credit Cards Still Hold Promise for Smaller Issuers

    May 4, 2026
    Dual-rail recurring billing for agentic commerce

    Fueling Agentic Commerce with Dual-Rail Recurring Billing

    May 1, 2026
    credit union p2p

    How Should Legacy Banks Compete with Chime?

    April 30, 2026
    Prepaid cards for payroll and tipping

    Tips on a Prepaid Card: A Practical Solution with Broad Industry Impacts

    April 29, 2026
    credit-push fraud

    Inside the Battle Against Credit-Push Fraud: What’s Changing

    April 28, 2026
    real-time payments fraud

    Stopping Fraud in Real-Time Payments Before It Starts

    April 27, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2026 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result