HomeCII/OTDNS Tunneling Abuse Expands to Tracking and Scanning Victims

DNS Tunneling Abuse Expands to Tracking and Scanning Victims

Published on

spot_img

Recent reports from cybersecurity experts at Palo Alto Networks’ Unit 42 have shed light on a disturbing trend in the world of cyber threats. Attackers are increasingly turning to DNS tunneling as a means of infiltrating networks, tracking online behavior, and gaining valuable insights into potential vulnerabilities within organizations. This malicious manipulation of DNS traffic represents a new frontier in cyber espionage, with attackers using sophisticated techniques to evade detection and compromise security measures.

DNS tunneling, traditionally used for smuggling malicious data from malware exploitation back to command-and-control servers, has now evolved into a tool for tracking victims’ activities and scanning network infrastructure. By encoding identity information in subdomain payloads and leveraging spoofed source IP addresses, attackers can deliver malicious domains to victims and gain access to sensitive data. This form of covert communication allows them to bypass traditional network firewalls and conceal their activities within legitimate outbound traffic.

In a recent blog post, Unit 42 researchers detailed several ongoing threat campaigns that have exploited DNS tunneling in novel ways. One such campaign, known as “TRkCdn,” targeted over 700 potential victims using a network of attacker-controlled domains and nameservers. By embedding information on specific users and their actions into subdomains of DNS queries, attackers were able to track victims’ interactions with email content. Another campaign, dubbed SpamTracker, used DNS tunneling to monitor spam delivery and phishing attempts, luring victims with fake offers and services.

In a particularly concerning development, researchers also observed attackers using DNS tunneling to scan victims’ network infrastructure for vulnerabilities. The so-called SecShow campaign sought out open resolvers and exploited resolver vulnerabilities to perform reflection attacks. By testing resolver delays and obtaining time-to-live information, attackers were able to identify potential targets in the education, high tech, and government sectors. This form of network scanning represents a new frontier in cyberattacks, with attackers using DNS tunneling to gather valuable intelligence before launching more damaging assaults.

To address this growing threat, Unit 42 researchers recommend that organizations take proactive steps to mitigate malicious DNS behavior. This includes controlling the service range of resolvers to accept necessary queries only and promptly updating resolver software to prevent the exploitation of vulnerabilities. Roger Grimes, a data-driven defense evangelist at security awareness training firm KnowBe4, emphasizes the importance of preventing attackers from gaining initial access to networks. By focusing on prevention strategies such as patching vulnerable software and educating users about the risks of social engineering attacks, organizations can significantly reduce their exposure to DNS tunneling and other forms of cyber threats.

As cyber attackers continue to innovate and adapt their tactics, it is essential for organizations to stay vigilant and implement robust security measures to protect against evolving threats. By understanding the risks posed by DNS tunneling and taking proactive steps to address vulnerabilities, businesses can safeguard their networks and data from malicious actors seeking to exploit weaknesses for financial gain or espionage purposes.

Source link

Latest articles

ShrinkLocker: Turning BitLocker into ransomware – Source: securelist.com

In a recent incident response engagement, a clever technique involving the misuse of the...

Seventy Percent of CISOs Concerned About Their Organization’s Vulnerability to Significant Attacks: The Register

Chief information security officers worldwide are feeling anxious about the future, with a recent...

Stop GPS Data Communication from Foreign Satellites in the United States

The Federal Communications Commission (FCC) has recently pushed for a permanent ban on potential...

Transformative Landscape in Legal Technology: From the Past to AI-Powered Future

Recent years have seen a rapid transformation in the legal sector due to advancements...

More like this

ShrinkLocker: Turning BitLocker into ransomware – Source: securelist.com

In a recent incident response engagement, a clever technique involving the misuse of the...

Seventy Percent of CISOs Concerned About Their Organization’s Vulnerability to Significant Attacks: The Register

Chief information security officers worldwide are feeling anxious about the future, with a recent...

Stop GPS Data Communication from Foreign Satellites in the United States

The Federal Communications Commission (FCC) has recently pushed for a permanent ban on potential...
en_USEnglish