Cybercriminals Exploit DNS Records for Malware and Scams

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 3 min read

Hackers Exploit Blind Spots in DNS for Malware Delivery

DNS Image
Image courtesy of Ars Technica

Hackers are now utilizing domain name system (DNS) records to hide malware in a way that is difficult for most security measures to detect. This technique allows malicious scripts to fetch binary files without raising red flags, as DNS traffic is often less scrutinized compared to web and email communications. DomainTools researchers recently identified malware using this method to host a binary for Joke Screenmate, a type of nuisance malware. The file is encoded in hexadecimal and split into multiple chunks, each stored in the TXT records of different subdomains.

Ian Campbell, a security operations engineer at DomainTools, noted that legitimate organizations struggle to differentiate between authentic DNS requests and suspicious ones. With the rise of encrypted DNS methods like DNS over HTTPS (DoH) and DNS over TLS (DoT), monitoring DNS traffic has become even more challenging. The technique of embedding malicious content in DNS records is not new but has evolved, as seen in the use of PowerShell scripts to pull commands from DNS queries.

For further insights, refer to the following sources: DomainTools on malware in DNS, Ars Technica on PowerShell Trojans, Asher Falcon's blog.


DNS TXT Records as a Medium for Malware Execution

Hackers Can Use DNS TXT Records to Execute the Malware
Image courtesy of AhnLab

According to AhnLab's ASEC, malware can execute using DNS TXT records, a method not widely recognized but significant for detection and analysis. Originally, DNS TXT records served to input human-readable text for purposes like spam prevention and domain ownership verification. However, attackers are exploiting this functionality to execute malicious code.

A recent phishing email contained a PowerPoint add-in (PPAM) file that, when executed, initiated a PowerShell command to query its DNS TXT records for further instructions. This method allows attackers to bypass conventional anti-malware solutions by dynamically adjusting their commands through DNS queries.

For more details, check out AhnLab’s findings on malware execution and the implications of DNS filtering.


DNS Hijacking Techniques for Investment Scams

Savvy Seahorse DNS Hijacking
Image courtesy of The Hacker News

A new threat actor, known as Savvy Seahorse, is using DNS hijacking techniques to lure victims into fake investment schemes. The actor convinces users to create accounts on fraudulent platforms and deposits funds, which are then transferred to Russian accounts. This group employs DNS canonical name (CNAME) records to create a traffic distribution system that allows for evasion of detection.

Their campaigns target speakers of various languages and utilize social media ads to draw in potential victims. The use of CNAME records enables Savvy Seahorse to quickly adapt their tactics, creating new subdomains associated with the primary campaign domain, making it challenging for security measures to keep up.

For an in-depth look at this technique, refer to Infoblox's report and The Hacker News on investment scams.


Malware Using Google DNS Over HTTPS

Google DNS
Image courtesy of BleepingComputer

Malware authors have exploited Google DNS over HTTPS to download malicious payloads. After gaining access to a Windows system, the malware uses PowerShell to query Google DNS for encoded payloads hidden in TXT records. Security researcher John Hammond from Huntress Labs highlighted how this method circumvents traditional DNS filtering as blocking HTTPS traffic is often not feasible.

The encoded payloads are cleverly disguised, making them appear as legitimate DNS records, which can mislead conventional detection systems. This dynamic approach allows attackers to modify their command-and-control infrastructure without needing direct access to the victim's system, enhancing their evasion tactics.

For further exploration of this topic, check out BleepingComputer's report and Huntress Labs' insights.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article
WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups
WinRAR vulnerability

WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups

CISA flags WinRAR CVE-2025-6218 as actively exploited. Learn about this path traversal flaw and how to protect your systems. Update now!

By Jim Gagnard December 11, 2025 3 min read
Read full article
Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers
malicious VSCode extensions

Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers

Beware of malicious VSCode extensions & device code phishing scams. Learn how these attacks steal credentials, capture screens, and hijack sessions. Protect yourself now!

By Alan V Gutnov December 10, 2025 6 min read
Read full article
PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure
BRICKSTORM malware

PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure

Discover how PRC state actors are using BRICKSTORM malware to gain persistent access via VMware. Learn about its advanced evasion techniques and how to defend your systems. Read now!

By Divyansh Ingle December 9, 2025 3 min read
Read full article