Thursday, January 16, 2025
HomeCyber Security NewsNew Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Published on

Botnets are the networks of compromised devices that have evolved significantly since the internet’s inception. Threat actors exploit vulnerabilities to control these devices remotely by leveraging them for malicious activities. 

These activities range from spamming to launching devastating distributed denial-of-service (DDoS) attacks, as the decentralized nature of botnets presents significant challenges to defenders. 

By orchestrating attacks from numerous compromised devices, threat actors overwhelm targets and mask their origin by making it difficult to identify and block the source of the attack. 

Malicious botnets orchestrate a wide range of cyberattacks and launch devastating DDoS attacks by crippling targets with overwhelming traffic. They spearhead spam and phishing campaigns by flooding inboxes and exploiting vulnerabilities for data theft. 

The operations of credential stuffing and data theft are automated, which allows for the exploitation of weak credentials and the exfiltration of sensitive information. 

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Cryptojacking leverages compromised devices for illicit cryptocurrency mining. Botnets also serve as proxies, masking attacker origins, and perpetrating click fraud that generates fraudulent ad revenue.

A late November malspam campaign impersonated DHL by distributing malicious zip files disguised as freight invoices. The emails that featured consistent filenames like “Invoice 123.zip” or “Tracking 456.zip” enticed recipients to open the attachments. 

This triggered a malware infection that could potentially lead to data exfiltration, system compromise, or other malicious activities. Analysis of tens of thousands of these spam emails revealed a sophisticated and potentially widespread attack.

The JavaScript file is obfuscated and designed to download and execute a PowerShell script that establishes an outbound connection to a malicious command and control (C2) server hosted on 62.133.60[.]137, which is an IP address associated with Global Connectivity Solutions (AS215540). 

How a misconfiguration in DNS enabled a botnet-powered malspam campaign
How a misconfiguration in DNS enabled a botnet-powered malspam campaign

The botnet leverages a vulnerability in routers that likely exploits a previously known flaw to gain remote access. An actor installs a script on each compromised device by turning it into a SOCKS proxy. 

It allows other malicious actors to leverage the botnet for various malicious activities, including DDoS attacks, data exfiltration, phishing campaigns, and malware distribution. 

According to Infoblox, the widespread use of these proxies significantly amplifies the botnet’s impact by masking the origin of attacks and providing anonymity to the attackers.

A misconfiguration in the SPF records of domains allowed malspam actors to bypass the email security measures—that is, a DNS record that identifies the authorized servers to send emails for a domain. 

A properly configured SPF record specifies the authorized servers and rejects emails from unauthorized servers.

However, the misconfigured SPF record included ‘+all’ at the end which allowed any server to send emails on behalf of the domain and defeats the purpose of the SPF record.

The malspam campaign leveraged over 13,000 compromised MikroTik devices functioning as SOCKS4 relays to send spoofed emails from 20,000 domains. By exploiting misconfigured DNS SPF records, the threat actors bypassed email protections. 

It highlights the critical need for robust security measures, including regular audits of device accessibility and proper DNS configurations and to mitigate the risks posed by this evolving botnet that can facilitate various malicious activities beyond malspam.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Latest articles

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property....

AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August...

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches

The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to...

Thousands of PHP-based Web Applications Exploited to Deploy Malware

A significant cybersecurity threat has emerged, threatening the integrity of thousands of PHP-based web...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property....

AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August...

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches

The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to...