Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

Posted on October 3, 2025October 3, 2025 By CWS

A menace actor named Detour Canine has been outed as powering campaigns distributing an data stealer often called Strela Stealer.
That is in response to findings from Infoblox, which discovered the menace actor to take care of management of domains internet hosting the primary stage of the stealer, a backdoor known as StarFish.
The DNS menace intelligence agency stated it has been monitoring Detour Canine since August 2023, when GoDaddy-owned Sucuri disclosed particulars of assaults focusing on WordPress websites to embed malicious JavaScript that used DNS TXT data as a communication channel for a visitors distribution system (TDS), redirecting website guests to sketchy websites and malware. Traces of the menace actor date again to February 2020.
“Whereas historically these redirects led to scams, the malware has advanced just lately to execute distant content material by way of the DNS-based command-and-control (C2) system,” Infoblox stated. “We’re monitoring the menace actor who controls this malware as Detour Canine.”
Detour Canine-owned infrastructure, per the corporate, has been used to host StarFish, a easy reverse shell that serves as a conduit for Strela Stealer. In a report printed in July 2025, IBM X-Power stated the backdoor is delivered by way of malicious SVG recordsdata with the aim of enabling persistent entry to contaminated machines.
Hive0145, the menace actor solely behind Strela Stealer campaigns since at the very least 2022, is assessed to be financially motivated and is probably going working as an preliminary entry dealer (IAB), buying and promoting entry to compromised techniques for revenue.
Infoblox’s evaluation has revealed that at the very least 69% of the confirmed StarFish staging hosts have been underneath the management of Detour Canine, and {that a} MikroTik botnet marketed as REM Proxy – which, in flip, is powered by SystemBC, as uncovered by Lumen’s Black Lotus Labs final month — was additionally a part of the assault chain.

Particularly, it has come to mild that the spam e-mail messages that distributed Strela Stealer originated from REM Proxy and one other botnet dubbed Tofsee, the latter of which has been propagated through a C++-based loader known as PrivateLoader prior to now. In each instances, Detour Canine infrastructure hosted the primary stage of the assault.
“The botnets have been contracted to ship the spam messages, and Detour Canine was contracted to ship the malware,” Dr. Renée Burton, vice chairman of menace intelligence at Infoblox, advised The Hacker Information.

What’s extra, Detour Canine has been discovered to facilitate the distribution of the stealer through DNS TXT data, with the menace actor-controlled DNS title servers modified to parse specifically formatted DNS queries from the compromised websites and to reply to them with distant code execution instructions.

Detour Canine’s modus operandi in the case of buying new infrastructure is by exploiting susceptible WordPress websites to carry out malicious code injections, though the corporate stated the strategies have since continued to evolve.
A notable side of the assault is that the compromised web site features usually 90% of the time, thereby elevating no crimson flags and permitting the malware to persist for prolonged durations of time. In choose cases (about 9%), nevertheless, a website customer is redirected to a rip-off through Assist TDS or Monetizer TDS; in a a lot rarer state of affairs (1%), the positioning receives a distant file execution command. It is believed that the redirections are restricted in a bid to keep away from detection.

The event marks the primary time Detour Canine has been noticed distributing malware, a shift from performing as an entity liable for solely forwarding visitors to Los Pollos, a malicious promoting expertise firm working underneath the VexTrio Viper umbrella.
“We suspect that they advanced from scams to incorporate malware distribution for monetary causes,” Burton stated. “There was an excessive amount of focus within the safety trade over the past 12-18 months to cease the kind of scams Detour Canine has supported prior to now. We consider they have been making much less cash, although we won’t confirm that.”
Complementing these modifications is the truth that the web site malware utilized by Detour Canine has witnessed an evolution of its personal, gaining the power to command contaminated web sites to execute code from distant servers.
As of June 2025, the responses have directed the contaminated website to retrieve the output of PHP scripts from verified Strela Stealer C2 servers to probably distribute the malware — suggesting the twin use of DNS as each a communication channel and a supply mechanism.
“Responses to TXT file queries are Base64-encoded and explicitly embrace the phrase ‘down’ to set off this new motion,” the corporate famous. “We consider this has created a novel networked malware distribution mannequin utilizing DNS by which the completely different levels are fetched from completely different hosts underneath the menace actor’s management and are relayed again when the person interacts with the marketing campaign lure, for instance, the e-mail attachment.

“A novel setup like this is able to permit an attacker to cover their id behind compromised web sites, making their operations extra resilient, in the meantime serving to mislead menace hunters as a result of the malware is not actually the place the analyzed attachments point out the stage is hosted.”
Your complete sequence of actions unfolds as follows –

Sufferer opens a malicious doc, launching an SVG file that reaches out to an contaminated area
The compromised website sends a TXT file request to the Detour Canine C2 server through DNS
The title server responds with a TXT file containing a Strela C2 URL, prefixed with “down”
The compromised website removes the down prefix and makes use of curl to probably fetch the StarFish downloader from the URL
The compromised website acts as a relay to ship the downloader to the consumer (i.e., the sufferer)
The downloader initiates a name to a different compromised area
The second compromised area sends an identical DNS TXT question to the Detour Canine C2 server
The Detour Canine title server responds with a brand new Strela C2 URL, once more prefixed with “down”
The second compromised area strips the prefix and sends a curl request to the Strela C2 server to fetch StarFish
The second compromised area acts as a relay to ship the malware to the consumer (i.e., the sufferer)

Infoblox stated it labored with the Shadowserver Basis to sinkhole two of Detour Canine’s C2 domains (webdmonitor[.]io and aeroarrows[.]io) on July 30 and August 6, 2025.
The corporate additionally identified that the menace actor probably features as a distribution-as-a-service (DaaS) supplier, including it discovered proof of an “apparently unrelated file” propagated by way of its infrastructure. Nonetheless, it famous it “could not validate what was delivered.”

The Hacker News Tags:Caught, Detour, DNSPowered, Dog, Factory, Malware, Running, Stealer, Strela

Post navigation

Previous Post: Top 10 Best Supply Chain Intelligence Security Companies in 2025
Next Post: Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked

Related Posts

Adds Device Fingerprinting, PNG Steganography Payloads The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News
Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns The Hacker News
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News
Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News