Threat actors found distributing malware via DNS

By

Check those TXT records.

Attackers are abusing the domain name system (DNS) to store and distribute malware, potentially creating blind spots for defenders, security researchers say.

Threat actors found distributing malware via DNS

It turns out that files can be stored in domain name system (DNS) TXT records, security vendor DomainTools reported.

As the name implies, TXT records allow domain owners to store text information for different purposes, such as for for email security and authentication, and verification of ownership, which can then be retrieved from the public DNS globally.

By querying the DNS and reassembling the TXT records retrieved that contain partitioned and encoded files, attackers can store malware persistently and access it as needed.

DomainTools' researchers looked for executable and common file patterns encoded into TXT records, and found one malware from that was an older prank software called Joke Screenmate.

Another researcher said he spotted credentials exfiltration in a DNS request:

The technique of abusing DNS for malicious purposes isn't new, Liam O'Shannessy, the executive director of security, testing and assurance at CyberCX Victoria/Tasmania told iTNews.

"The storage of malware in DNS TXT [records] fills a unique niche as an attack technique," O'Shannessy said.

Using DNS for command and control (C2), including the distribution of malware payloads, is relatively well understood by both attackers and defenders, O'Shannessy explained.

"The use of this technique by attackers is uncommon, because for a lot of organisations, it stands out to defenders who can use it as a strong signal that something is going wrong with their networks."

Nevertheless, anomalous DNS traffic can be missed, CyberCX has found.

"In our penetration tests and Red Team activities, we regularly observe organisations for whom DNS traffic is a 'blind spot' in their detection and response capabilities," O'Shannessy said.

"For attacks against those organisations, DNS-based C2 can be an effective technique for attackers, in particular in situations where other types of outbound network access from internal networks to the Internet are blocked," he added.

O'Shannessy said the research published this week is a reminder to defenders to ensuer that they monitor DNS-based traffic forms, as an important part of their capabilities.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Melbourne dev finds gift card PINs can be brute-forced

Melbourne dev finds gift card PINs can be brute-forced

"Widespread data theft" hits Salesforce customers via third party

"Widespread data theft" hits Salesforce customers via third party

Zero-click Apple and WhatsApp bug combo used to drop gov spyware

Zero-click Apple and WhatsApp bug combo used to drop gov spyware

Western Sydney University targets file-sharing sites hosting stolen data

Western Sydney University targets file-sharing sites hosting stolen data

Log In

  |  Forgot your password?