Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records

New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records

Posted on October 1, 2025October 1, 2025 By CWS

A complicated DNS-based malware marketing campaign has emerged, using 1000’s of compromised web sites worldwide to ship the Strela Stealer information-stealing malware by means of an unprecedented approach involving DNS TXT data.

The risk, tracked as Detour Canine by safety researchers, represents a major evolution in malware distribution strategies that leverages the Area Identify System as each a command-and-control mechanism and supply channel.

The malware marketing campaign impacts tens of 1000’s of internet sites globally, creating an unlimited community of contaminated hosts that talk with actor-controlled title servers by means of specifically crafted DNS queries.

These server-side DNS requests stay invisible to web site guests, permitting the malicious infrastructure to function covertly whereas sustaining the looks of legit internet visitors.

The contaminated websites conditionally redirect guests to malicious content material primarily based on their geographic location and system kind, creating a classy filtering mechanism that helps evade detection.

Detour Canine has advanced considerably from its origins as a redirect-to-scam operation.

The risk actor behind this marketing campaign has been lively since not less than August 2023, initially specializing in redirecting customers to fraudulent web sites and tech assist scams.

Nevertheless, current developments present a marked shift towards direct malware distribution, significantly in campaigns focusing on European customers with the Strela Stealer payload.

Infoblox analysts recognized the connection between Detour Canine infrastructure and Strela Stealer operations throughout summer time 2025, once they found that not less than 69 p.c of confirmed StarFish staging hosts have been beneath Detour Canine management.

A number of assault vectors make the most of Detour Canine-controlled belongings (Supply – Infoblox)

This discovering revealed that the risk actor was not merely redirecting visitors however actively collaborating in multi-stage malware supply chains that culminated in data theft operations.

Superior DNS TXT Command and Management Infrastructure

The technical sophistication of Detour Canine’s DNS-based command and management system represents a novel method to malware communication that exploits the usually missed DNS TXT file performance.

The contaminated web sites generate DNS queries following a structured format that embeds sufferer data instantly into the subdomain construction:-

….c2_domain

The system underwent a major improve in spring 2025 when operators added distant code execution capabilities triggered by Base64-encoded responses containing the key phrase “down.”

When an contaminated website receives such a response, it strips the prefix and makes use of curl to fetch content material from specified URLs, successfully turning compromised web sites into proxy servers for malware distribution.

The DNS TXT responses observe a selected format that allows complicated multi-stage payload supply.

For instance, a decoded response would possibly seem as:-

down

This command instructs the contaminated website to retrieve content material from a StarFish C2 server and relay it again to the sufferer, making a distributed supply community that obscures the true supply of malicious content material.

The system helps each script.php and file.php endpoints, equivalent to completely different phases of the Strela Stealer supply course of.

The risk actor has demonstrated exceptional resilience in sustaining their infrastructure. When the Shadowserver Basis sinkholed the webdmonitor.io area in August 2025, Detour Canine operators established a alternative C2 server inside hours, seamlessly transferring management of their contaminated web site community to the brand new aeroarrows.io area.

Evaluation of sinkhole information revealed roughly 30,000 distinctive domains spanning 584 distinct top-level domains, all producing correctly formatted DNS TXT queries to the actor-controlled infrastructure.

The size and persistence of this operation spotlight the effectiveness of DNS as a covert communication channel for malware operations.

The distributed nature of the contaminated web site community, mixed with the legit look of DNS visitors, creates vital challenges for conventional safety monitoring methods that will not scrutinize TXT file communications with the identical depth utilized to different community protocols.

This represents a major development in malware distribution methods, the place DNS infrastructure serves twin functions as each a command channel and a content material supply mechanism, making a resilient and difficult-to-detect risk ecosystem.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Delivers, Detour, DNS, Dog, Malware, Records, Stealer, Strela, TXT

Post navigation

Previous Post: Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware
Next Post: New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses

Related Posts

Python-powered Toolkit for Information Gathering and reconnaissance Python-powered Toolkit for Information Gathering and reconnaissance Cyber Security News
ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data Cyber Security News
Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Cyber Security News
Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content Cyber Security News
Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs Cyber Security News
Top 20 Most Exploited Vulnerabilities of 2025 Top 20 Most Exploited Vulnerabilities of 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News