Friday, February 21, 2025
HomeCyber Security NewsNew Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Published on

SIEM as a Service

Follow Us on Google News

Botnets are the networks of compromised devices that have evolved significantly since the internet’s inception. Threat actors exploit vulnerabilities to control these devices remotely by leveraging them for malicious activities. 

These activities range from spamming to launching devastating distributed denial-of-service (DDoS) attacks, as the decentralized nature of botnets presents significant challenges to defenders. 

By orchestrating attacks from numerous compromised devices, threat actors overwhelm targets and mask their origin by making it difficult to identify and block the source of the attack. 

Malicious botnets orchestrate a wide range of cyberattacks and launch devastating DDoS attacks by crippling targets with overwhelming traffic. They spearhead spam and phishing campaigns by flooding inboxes and exploiting vulnerabilities for data theft. 

The operations of credential stuffing and data theft are automated, which allows for the exploitation of weak credentials and the exfiltration of sensitive information. 

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Cryptojacking leverages compromised devices for illicit cryptocurrency mining. Botnets also serve as proxies, masking attacker origins, and perpetrating click fraud that generates fraudulent ad revenue.

A late November malspam campaign impersonated DHL by distributing malicious zip files disguised as freight invoices. The emails that featured consistent filenames like “Invoice 123.zip” or “Tracking 456.zip” enticed recipients to open the attachments. 

This triggered a malware infection that could potentially lead to data exfiltration, system compromise, or other malicious activities. Analysis of tens of thousands of these spam emails revealed a sophisticated and potentially widespread attack.

The JavaScript file is obfuscated and designed to download and execute a PowerShell script that establishes an outbound connection to a malicious command and control (C2) server hosted on 62.133.60[.]137, which is an IP address associated with Global Connectivity Solutions (AS215540). 

How a misconfiguration in DNS enabled a botnet-powered malspam campaign
How a misconfiguration in DNS enabled a botnet-powered malspam campaign

The botnet leverages a vulnerability in routers that likely exploits a previously known flaw to gain remote access. An actor installs a script on each compromised device by turning it into a SOCKS proxy. 

It allows other malicious actors to leverage the botnet for various malicious activities, including DDoS attacks, data exfiltration, phishing campaigns, and malware distribution. 

According to Infoblox, the widespread use of these proxies significantly amplifies the botnet’s impact by masking the origin of attacks and providing anonymity to the attackers.

A misconfiguration in the SPF records of domains allowed malspam actors to bypass the email security measures—that is, a DNS record that identifies the authorized servers to send emails for a domain. 

A properly configured SPF record specifies the authorized servers and rejects emails from unauthorized servers.

However, the misconfigured SPF record included ‘+all’ at the end which allowed any server to send emails on behalf of the domain and defeats the purpose of the SPF record.

The malspam campaign leveraged over 13,000 compromised MikroTik devices functioning as SOCKS4 relays to send spoofed emails from 20,000 domains. By exploiting misconfigured DNS SPF records, the threat actors bypassed email protections. 

It highlights the critical need for robust security measures, including regular audits of device accessibility and proper DNS configurations and to mitigate the risks posed by this evolving botnet that can facilitate various malicious activities beyond malspam.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...