Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

Posted on May 20, 2025May 20, 2025 By CWS

Might 20, 2025Ravie LakshmananMalware / Cloud Safety
A risk actor generally known as Hazy Hawk has been noticed hijacking deserted cloud assets of high-profile organizations, together with Amazon S3 buckets and Microsoft Azure endpoints, by leveraging misconfigurations within the Area Identify System (DNS) data.
The hijacked domains are then used to host URLs that direct customers to scams and malware by way of visitors distribution techniques (TDSes), based on Infoblox. A number of the different assets usurped by the risk actor embrace these hosted on Akamai, Bunny CDN, Cloudflare CDN, GitHub, and Netlify.
The DNS risk intelligence agency stated it first found the risk actor after it gained management of a number of sub-domains related to the U.S. Heart for Illness Management (CDC) in February 2025.
It has since been decided that different authorities companies throughout the globe, distinguished universities, and worldwide companies reminiscent of Deloitte, PricewaterhouseCoopers, and Ernst & Younger have been victimized by the identical risk actor since a minimum of December 2023.

“Maybe probably the most exceptional factor about Hazy Hawk is that these hard-to-discover, susceptible domains with ties to esteemed organizations will not be getting used for espionage or ‘intellectual’ cybercrime,” Infoblox’s Jacques Portal and Renée Burton stated in a report shared with The Hacker Information.
“As an alternative, they feed into the seedy underworld of adtech, whisking victims to a variety of scams and faux purposes, and utilizing browser notifications to set off processes that can have a lingering affect.”
What makes Hazy Hawk’s operations noteworthy is the hijacking of trusted and respected domains belonging to legit organizations, thus boosting their credibility in search outcomes when they’re getting used to serve malicious and spammy content material. However much more concerningly, the method permits the risk actors to bypass detection.
Underpinning the operation is the power of the attackers to grab management of deserted domains with dangling DNS CNAME data, a way beforehand uncovered by Guardio in early 2024 as being exploited by dangerous actors for spam proliferation and click on monetization. All a risk actor must do is register the lacking useful resource to hijack the area.

Hazy Hawk goes a step additional by discovering deserted cloud assets after which commandeering them for malicious functions. In some instances, the risk actor employs URL redirection strategies to hide which cloud useful resource was hijacked.
“We use the title Hazy Hawk for this actor due to how they discover and hijack cloud assets which have dangling DNS CNAME data after which use them in malicious URL distribution,” Infoblox stated. “It is potential that the area hijacking element is supplied as a service and is utilized by a bunch of actors.”
The assault chains typically contain cloning the content material of legit websites for his or her preliminary web site hosted on the hijacked domains, whereas luring victims into visiting them with pornographic or pirated content material. The positioning guests are then funneled by way of a TDS to find out the place they land subsequent.

“Hazy Hawk is likely one of the dozens of risk actors we observe inside the promoting affiliate world,” the corporate stated. “Menace actors who belong to affiliate promoting packages drive customers into tailor-made malicious content material and are incentivized to incorporate requests to permit push notifications from ‘web sites’ alongside the redirection path.”
In doing so, the concept is to flood a sufferer’s machine with push notifications and ship an countless torrent of malicious content material, with every notification resulting in completely different scams, scareware, and faux surveys, and accompanied by requests to permit extra push notifications.
To stop and defend in opposition to Hazy Hawk actions, area house owners are beneficial to take away a DNS CNAME report as quickly as a useful resource is shut down. Finish customers, then again, are suggested to disclaim notification requests from web sites they do not know.
“Whereas operators like Hazy Hawk are accountable for the preliminary lure, the consumer who clicks is led right into a labyrinth of sketchy and outright malicious adtech. The truth that Hazy Hawk places appreciable effort into finding susceptible domains after which utilizing them for rip-off operations exhibits that these promoting affiliate packages are profitable sufficient to pay effectively,” Infoblox stated.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:CDC, Corporate, Delivery, DNS, Domains, Exploits, Hawk, Hazy, Hijack, Malware, Records

Post navigation

Previous Post: 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
Next Post: How to Report a Cybercrime in Your Country

Related Posts

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT The Hacker News
North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress The Hacker News
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News
Why Exposed Credentials Remain Unfixed—and How to Change That The Hacker News
38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Company Emails Against Phishing
  • How to Report a Cybercrime in Your Country
  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Secure Company Emails Against Phishing
  • How to Report a Cybercrime in Your Country
  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News