Hackers Abuse DNS Blind Spots to Stealthily Deliver Malware

Threat Level
65%
6 articles 100.0% Similarity 1 day ago

Activity Timeline

Hackers exploit a blind spot by hiding malware ins...
Ars Technica
Jul 16
11:15
Hackers Use DNS Queries to Evade Defenses and Exfi...
GB Hackers
Jul 17
09:52
Hackers Are Finding New Ways to Hide Malware in DN...
Wired
Jul 17
11:30
Hackers Exploit DNS Queries for C2 Operations and ...
Cybersecurity News
Jul 17
11:30
Hackers Exploiting DNS Blind Spots to Hide and Del...
Cybersecurity News
Jul 17
17:29
Hackers Abuse DNS Blind Spots to Stealthily Delive...
GB Hackers
Primary Article
Jul 18
05:00
Hackers Abuse DNS Blind Spots to Stealthily Deliver Malware
Hackers Abuse DNS Blind Spots to Stealthily Deliver Malware Cybersecurity researchers have uncovered a sophisticated technique where threat actors are exploiting DNS infrastructure to covertly store and distribute malware, turning the internet’s domain name system into an unwitting accomplice for malicious activities. The discovery reveals how attackers can hide executable files within DNS TXT records, creating a stealthy delivery mechanism that bypasses traditional security measures. The attack method involves partitioningmalwarefiles into smaller segments and storing them across multiple DNS TXT records after converting them to hexadecimal format. Security researchers analyzing passively collected DNS records found evidence of this technique being actively used between 2021-2022, with attackers embedding complete executable files within seemingly innocuous DNS entries. “Files can be partitioned and stored in DNS TXT records, then retrieved via DNS requests and put back together,” exp...

Cluster AI

Beta Organization

Save to Folder

Choose a folder to save this cluster: