Tuesday, April 22, 2025
HomeCyber AttackHackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack

Hackers Registered 500k+ Domains Using Algorithms For Extensive Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities. 

Such domains are capable of pretending to be trusted entities, which helps to make individuals disclose their sensitive details or download harmful content.

Cybersecurity researchers at InfoBlox recently discovered that hackers have registered more than 500k domains by using Registered Domain Generation Algorithms for extensive cyber attacks.

- Advertisement - Google News

Hackers Registered 500k+ Domains

Registered Domain Generation Algorithms (RDGAs) are an evolution of the traditional DGAs that threat actors have used to register domains secretly, numbering up to millions.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

On the other hand, unlike malware-based DGAs, RDGAs are flexible and can be used for various malicious purposes, such as phishing, malware, and scams.

Besides this, researchers unveiled Revolver Rabbit, an RDGA threat actor associated with XLoader malware, and Hancitor malware’s long-time use of RDGA for C2 Cross-Domain Identity Management.

They utilize harder-to-detect RDGAs as opposed to traditional DGAs, and criminal groups and legitimate businesses apply them. Some registrars even provide Cross-Domain Identity Management services.

Difference in domain registration behaviors of traditional DGAs and registered DGAs (Source – InfoBlox)

This new technique significantly alters the DNS threat landscape, creating more challenges in cybersecurity.

RDGAs vary from traditional DGAs in that they are used to register many domains privately.

Due to the complicated patterns exhibited by RDGAs, which range from random characters to constructed word combinations, detecting them is difficult without massive DNS data analysis.

The case study of Hancitor malware shows how RDGAs turned into C2 domain generators and adopted a repeated character pattern like typical English words.

Infoblox created a statistical model in 2018 for preemptively identifying and blocking domains created by Hancitor’s RDGA, which helps underscore the need for advanced detection techniques for these maturing threats.

Revolver Rabbit, a famous horn-stepper from RDGA, has registered more than 500,000 domains on the .bond TLD alone by using changeable patterns that mix up dictionary words, numbers, and country codes.

It is important to note that these actors’ domains have been linked to XLoader malware, which reminds us of the significance of RDGA detection.

During the six-month period in question, around 2 million unique RDGA domains were detected at an average rate of 11,000 new ones per day in approximately 52,000 actor groups.

Manual research is ineffective as of the magnitude and intricacy of RDGA operations, consequently, automatic detection must remain the frontline defense against such threats.

Organizations should be aware of multiple malicious activities associated with RDGAs and implement advanced DNS analytics-based security solutions for their networks.

Indicators Of Activity

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Raga Varshini
Raga Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

The Akira ransomware group has intensified its operations, targeting over 350 organizations and claiming...