Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Posted on July 17, 2025July 17, 2025 By CWS

A classy new assault vector the place malicious actors are hiding malware inside DNS data, exploiting a important blind spot in most organizations’ safety infrastructure.

This system transforms the Web’s Area Title System into an unconventional file storage system, permitting attackers to distribute malware whereas evading conventional detection strategies.

Current investigations utilizing DNSDB Scout, a passive DNS intelligence platform, have revealed that cybercriminals are partitioning malware information and storing them in DNS TXT data.

These data, designed initially to carry descriptive textual content for domains, can retailer arbitrary knowledge that persists till DNS servers take away or overwrite the data.

The assault methodology includes changing malicious executable information into hexadecimal format, then fragmenting them throughout a number of subdomains.

DomainTools researchers found proof of this method by looking for magic file bytes in hexadecimal format utilizing refined regex patterns to establish numerous executable and customary file varieties.

Malware in DNS TXT Data

Throughout evaluation of DNS data from 2021-2022, safety researchers recognized TXT data containing executable file headers throughout three totally different domains sharing an identical subdomain patterns.

Probably the most vital discovery concerned the area “*.felix.stf.whitetreecollective[.]com,” which contained a whole bunch of iterated subdomain integer values, every storing totally different fragments of an executable file.

By reassembling these fragments utilizing the integer values as sequence markers, researchers efficiently reconstructed full malware information with SHA256 hashes:

7ff0ecf2953b8662ede1577e330a514f09992c18aa3c14ed77cf2ffc115b0866

e7b22ba761a7f853b63933ffe517cc61596710dbdee992a429ac1bc8d04186a1

Each information have been recognized as Joke Screenmate malware, a type of prank software program that reveals a number of disruptive behaviors, together with simulating harmful actions, interfering with consumer management, displaying unsolicited content material, and inflicting system efficiency points.

The investigation revealed a extra regarding discovery: malicious PowerShell instructions saved in TXT data.

Researchers discovered encoded stager scripts in DNS data related to drsmitty[.]com that connect with cspg[.]pw, using the default endpoint for a Covenant C2 server (/api/v1/nps/payload/stage1) to ship next-stage payloads.

This system represents a big evolution in malware supply, as safety options typically overlook DNS site visitors in comparison with the in depth monitoring of net and e-mail communications.

The identical C2 area was recognized in DNS data relationship again to July 2017, suggesting this assault vector has been operational for years.

DNS tunneling and malware storage exploit a elementary weak spot in enterprise safety methods. DNS is steadily ignored of visibility and compliance planning, regardless of being the spine of recent digital infrastructure.

Current research point out that 90% of malware makes use of DNS in its kill chain, with 95% utilizing DNS to speak with command-and-control servers.

The rise of encrypted DNS protocols like DNS over HTTPS (DoH) and DNS over TLS (DoT) additional complicates detection efforts. These applied sciences, designed to guard consumer privateness, additionally present attackers with further cowl for his or her malicious actions.

Safety consultants emphasize that organizations should implement complete DNS monitoring and filtering options to detect these refined assaults.

As cybercriminals proceed to use trusted protocols like DNS, enterprises can not afford to deal with DNS as a easy utility service requiring minimal safety oversight.

The invention of this assault vector underscores the important want for DNS safety options that may distinguish between reliable queries and people used for malicious functions, reworking DNS from a safety blind spot right into a proactive protection mechanism.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:Blind, Deliver, DNS, Exploiting, Hackers, Malware, Records, Spots, Store

Post navigation

Previous Post: 4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities
Next Post: H2Miner Attacking Linux, Windows, and Containers to Mine Monero

Related Posts

Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Cyber Security News
Post-Quantum Cryptography What CISOs Need to Know Cyber Security News
Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access Cyber Security News
The Rise of Subscription-Based Cybercrime Cyber Security News
Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News