Tuesday, December 17, 2024
HomeInfosec- ResourcesDomain Fronting - A New Technique For Hiding Malware Command and Control...

Domain Fronting – A New Technique For Hiding Malware Command and Control (C2) Traffic within a Content Delivery Network

Published on

SIEM as a Service

A New Technique called ” Domain Fronting “  allow cybercriminals to hide the command & control Networks Traffic within a CDN. It acts as a mask for  C&C networks and widely used advanced Technique for Malware Evasion.

“A content delivery network (CDN) is a system of distributed servers (network) that deliver pages and other Web content to a user, based on the geographic locations of the user, the origin of the web page and the content delivery server.”

There are many CND’s performing this content Delivery operation including CloudFlare, Akamai, Azure, Amazon.

- Advertisement - SIEM as a Service

This Method Affected by Many  CND’s and major impact has been Identified in Akamai Technologies which carried the highly significant amount of traffic of various HIgh reputation domains through which we can mask our traffic.

According to Akamai, their CDN carries 15-30% of the world’s web traffic, and it is extremely common to see outbound traffic to Akamai’s network from almost any potential target. This makes Akamai’s CDN a prime target for this new approach to domain fronting.

Domain Fronting Working Method

Also Read    Using n1n3 to Simulate an evasive “Fileless” Malware – Proof Of Concept

TOR Project used For Domain Fronting

Tor Project used to implement the Domain Fronting to evade censorship in Different Countries where the internet Restriction that denies accessing the Particular Website which serves under the Content Delivery Networks.

One specific Akamai domain (a248.e.akamai.net) was in use by the Tor project to bypass China’s internet restrictions and was later blocked in China, as it was used bypass the country’s content filtering controls.Cyber Ark said.

Few months before CyberArk explained about this Domain Fronting says, There are 1000 of Domains are affected by this Domain Fronting Method includes domains for Fortune 100 companies.

Two Requirements of Domain Fronting

As an Attacker, you need two Requirements for Successfully implementing the DF For Evade the Traffic of Command & Control.

  • A two-way, persistent read-write mechanism (system or application) must be hosted by the CDN. Which means to utilize the list of an application hosted by the CDN to exchange instructions and data with Attacker.
  • Malware must be specially crafted to use this C2 channel, and users’ machines must be infected with this malware.

Implementing Malware Command and Control 

CyberArk Conclude that This C2 evasion technique emphasizes the point that attackers, insiders or external actors, will find ways to establish a foothold within the network.

The CDN could also give each domain virtual IP addresses that are tied to a specific SSL certificate. This stops malware from nesting in CDNs, but there are simply not enough public IPv4 addresses to make this happen.

Also Read   Hackers Increasing the use of “Command Line Evasion and obfuscation” to Spread Advance Level Threats

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which...

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals,...

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in...

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hackers come in many forms with sophisticated Hacking Techniques, While there has been a...