Understanding DNS Tunneling: Risks, Examples, and Protection Tips

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 17, 2025
3 min read

Malware Embedded in DNS

DomainTools reported that malware can now be embedded within Domain Name System (DNS) records, raising concerns about its security and potential for abuse. DNS is essential for translating domain names, like "example.com," into IP addresses, enabling users to access websites without needing to remember numerical addresses. However, this system has become a target for malicious actors.

internet

Image courtesy of Tom's Hardware

The exploitation of DNS records began when Ben Cartwright-Cox proposed a file system using DNS as a base. This led to reports of hackers hiding images within DNS records, prompting DomainTools to search for executable file types within DNS records. Their findings indicated that a malicious actor was using DNS TXT records to store and potentially deliver joke malware, known for causing system disturbances and displaying fake error messages.

For further details, see the original reports from DomainTools here and Cyber Security News here.

DNS Exploitation Techniques

Hackers are increasingly using DNS records to hide malware, allowing them to bypass traditional defenses. DomainTools noted that this method enables malware to be fetched without raising alarms, as DNS traffic often goes unmonitored compared to web and email traffic. Specifically, researchers identified a malicious binary for Joke Screenmate stashed in various DNS records, demonstrating how hex-encoded malware can be spread via DNS.

DNS Image

Image courtesy of Ars Technica

The technique involves breaking malware into chunks and embedding them within the DNS records of a domain, such as whitetreecollective.com. Each chunk is stored in a TXT record, which typically holds arbitrary text. Once an attacker gains access to a network, they can reconstruct the malware by querying these chunks through DNS requests. Ian Campbell from DomainTools highlighted the difficulty organizations face in monitoring DNS traffic, especially with the rise of encrypted DNS traffic via DOH (DNS over HTTPS) and DOT (DNS over TLS).

For more comprehensive insights, refer to Ars Technica’s article here and DomainTools' findings here.

DNS Tunneling Attacks

DNS tunneling attacks exploit the DNS protocol to create covert communication channels for malicious activities. This technique allows cybercriminals to bypass security measures, executing commands and extracting data without detection. The inherent trust in DNS makes it a prime target for such attacks.

DNS Tunneling attack

Image courtesy of ClouDNS

In a typical DNS tunneling scenario, an attacker registers a domain and configures a server to receive DNS queries from compromised devices. These queries carry encoded commands that the attacker can use to control the infected system. Despite the effectiveness of DNS tunneling, many organizations neglect monitoring DNS traffic, focusing instead on web and email security.

To detect DNS tunneling, organizations can analyze DNS payloads for anomalies, monitor traffic volume from specific IP addresses, and check for unusual patterns in DNS queries. For more information on DNS tunneling, refer to the ClouDNS blog here.

Mitigating DNS Tunneling Risks

To combat DNS tunneling, organizations need to enhance their monitoring and detection capabilities. Implementing a DNS firewall can help identify and block malicious domains, while regular vulnerability assessments can uncover weak points in a network's defenses.

Best practices include:

  • Directing all internal DNS requests through designated internal servers to filter potential threats.
  • Monitoring DNS traffic for unusual patterns or spikes.
  • Training staff to recognize and report suspicious activities.

For extensive guidelines on preventing DNS tunneling attacks, refer to Palo Alto Networks here and ClouDNS monitoring services here.

For further information on securing your DNS infrastructure and protecting against various cyber threats, explore our services at undefined or contact us at undefined.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article