Sunday, January 5, 2025
HomeInfosec- ResourcesDomain Fronting - A New Technique For Hiding Malware Command and Control...

Domain Fronting – A New Technique For Hiding Malware Command and Control (C2) Traffic within a Content Delivery Network

Published on

SIEM as a Service

A New Technique called ” Domain Fronting “  allow cybercriminals to hide the command & control Networks Traffic within a CDN. It acts as a mask for  C&C networks and widely used advanced Technique for Malware Evasion.

“A content delivery network (CDN) is a system of distributed servers (network) that deliver pages and other Web content to a user, based on the geographic locations of the user, the origin of the web page and the content delivery server.”

There are many CND’s performing this content Delivery operation including CloudFlare, Akamai, Azure, Amazon.

- Advertisement - SIEM as a Service

This Method Affected by Many  CND’s and major impact has been Identified in Akamai Technologies which carried the highly significant amount of traffic of various HIgh reputation domains through which we can mask our traffic.

According to Akamai, their CDN carries 15-30% of the world’s web traffic, and it is extremely common to see outbound traffic to Akamai’s network from almost any potential target. This makes Akamai’s CDN a prime target for this new approach to domain fronting.

Domain Fronting Working Method

Also Read    Using n1n3 to Simulate an evasive “Fileless” Malware – Proof Of Concept

TOR Project used For Domain Fronting

Tor Project used to implement the Domain Fronting to evade censorship in Different Countries where the internet Restriction that denies accessing the Particular Website which serves under the Content Delivery Networks.

One specific Akamai domain (a248.e.akamai.net) was in use by the Tor project to bypass China’s internet restrictions and was later blocked in China, as it was used bypass the country’s content filtering controls.Cyber Ark said.

Few months before CyberArk explained about this Domain Fronting says, There are 1000 of Domains are affected by this Domain Fronting Method includes domains for Fortune 100 companies.

Two Requirements of Domain Fronting

As an Attacker, you need two Requirements for Successfully implementing the DF For Evade the Traffic of Command & Control.

  • A two-way, persistent read-write mechanism (system or application) must be hosted by the CDN. Which means to utilize the list of an application hosted by the CDN to exchange instructions and data with Attacker.
  • Malware must be specially crafted to use this C2 channel, and users’ machines must be infected with this malware.

Implementing Malware Command and Control 

CyberArk Conclude that This C2 evasion technique emphasizes the point that attackers, insiders or external actors, will find ways to establish a foothold within the network.

The CDN could also give each domain virtual IP addresses that are tied to a specific SSL certificate. This stops malware from nesting in CDNs, but there are simply not enough public IPv4 addresses to make this happen.

Also Read   Hackers Increasing the use of “Command Line Evasion and obfuscation” to Spread Advance Level Threats

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...

Top 10 Best Proxy Server 2025 & Important Methods to Prevent Yourself From Hackers

Best Proxy Server has been used in enormous cases where some personal data or...