Cybercriminals Exploit DNS Records for Malware and Scams

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 3 min read

Hackers Exploit Blind Spots in DNS for Malware Delivery

DNS Image
Image courtesy of Ars Technica

Hackers are now utilizing domain name system (DNS) records to hide malware in a way that is difficult for most security measures to detect. This technique allows malicious scripts to fetch binary files without raising red flags, as DNS traffic is often less scrutinized compared to web and email communications. DomainTools researchers recently identified malware using this method to host a binary for Joke Screenmate, a type of nuisance malware. The file is encoded in hexadecimal and split into multiple chunks, each stored in the TXT records of different subdomains.

Ian Campbell, a security operations engineer at DomainTools, noted that legitimate organizations struggle to differentiate between authentic DNS requests and suspicious ones. With the rise of encrypted DNS methods like DNS over HTTPS (DoH) and DNS over TLS (DoT), monitoring DNS traffic has become even more challenging. The technique of embedding malicious content in DNS records is not new but has evolved, as seen in the use of PowerShell scripts to pull commands from DNS queries.

For further insights, refer to the following sources: DomainTools on malware in DNS, Ars Technica on PowerShell Trojans, Asher Falcon's blog.


DNS TXT Records as a Medium for Malware Execution

Hackers Can Use DNS TXT Records to Execute the Malware
Image courtesy of AhnLab

According to AhnLab's ASEC, malware can execute using DNS TXT records, a method not widely recognized but significant for detection and analysis. Originally, DNS TXT records served to input human-readable text for purposes like spam prevention and domain ownership verification. However, attackers are exploiting this functionality to execute malicious code.

A recent phishing email contained a PowerPoint add-in (PPAM) file that, when executed, initiated a PowerShell command to query its DNS TXT records for further instructions. This method allows attackers to bypass conventional anti-malware solutions by dynamically adjusting their commands through DNS queries.

For more details, check out AhnLab’s findings on malware execution and the implications of DNS filtering.


DNS Hijacking Techniques for Investment Scams

Savvy Seahorse DNS Hijacking
Image courtesy of The Hacker News

A new threat actor, known as Savvy Seahorse, is using DNS hijacking techniques to lure victims into fake investment schemes. The actor convinces users to create accounts on fraudulent platforms and deposits funds, which are then transferred to Russian accounts. This group employs DNS canonical name (CNAME) records to create a traffic distribution system that allows for evasion of detection.

Their campaigns target speakers of various languages and utilize social media ads to draw in potential victims. The use of CNAME records enables Savvy Seahorse to quickly adapt their tactics, creating new subdomains associated with the primary campaign domain, making it challenging for security measures to keep up.

For an in-depth look at this technique, refer to Infoblox's report and The Hacker News on investment scams.


Malware Using Google DNS Over HTTPS

Google DNS
Image courtesy of BleepingComputer

Malware authors have exploited Google DNS over HTTPS to download malicious payloads. After gaining access to a Windows system, the malware uses PowerShell to query Google DNS for encoded payloads hidden in TXT records. Security researcher John Hammond from Huntress Labs highlighted how this method circumvents traditional DNS filtering as blocking HTTPS traffic is often not feasible.

The encoded payloads are cleverly disguised, making them appear as legitimate DNS records, which can mislead conventional detection systems. This dynamic approach allows attackers to modify their command-and-control infrastructure without needing direct access to the victim's system, enhancing their evasion tactics.

For further exploration of this topic, check out BleepingComputer's report and Huntress Labs' insights.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Tribal-ISAC

Tribal-ISAC Cybersecurity Report Highlights for Tribal Nations

Discover the vital findings from the Tribal-ISAC's inaugural cybersecurity report, empowering Tribal Nations to enhance their cyber resilience. Read more!

By Edward Zhou October 2, 2025 3 min read
Read full article
Stefanini Group

Stefanini Group Strengthens Cybersecurity with Key Acquisitions

Discover how Stefanini Group's merger with Cyber Smart Defence strengthens its cybersecurity division and enhances service offerings. Learn more!

By Edward Zhou October 2, 2025 3 min read
Read full article
cybersecurity

Cybersecurity Alert: 94% of Leaked Passwords Are Not Unique

Discover essential password habits and best practices to enhance your cybersecurity. Learn how to protect your accounts today!

By Edward Zhou October 2, 2025 3 min read
Read full article
cybersecurity

Cybersecurity Alert: 94% of Passwords Are Not Unique - Learn Why

Learn effective password habits to enhance your cybersecurity. Discover password management techniques to protect against online threats. Act now!

By Edward Zhou October 2, 2025 3 min read
Read full article