top of page

New Cybersecurity Threat: DNS Tunneling Used in Phishing and Network Scanning

In a recent cybersecurity development, attackers are leveraging Domain Name System (DNS) tunneling to orchestrate more insidious phishing attacks and conduct detailed scans of network vulnerabilities. This technique manipulates DNS, a crucial component of network communication, into a secret channel for data transfer and command execution.

DNS tunneling involves encoding data or commands within DNS queries, allowing the transfer of information through seemingly benign network traffic. This method has been used to bypass network security measures like firewalls and filters, often employed in command and control (C2) operations and to establish covert VPNs.

The security researchers at Palo Alto Networks' Unit 42 have unearthed new malicious applications of this technique, notably in campaigns aimed at tracking victim behavior and scanning network infrastructures.

Tracking Victim Interactions: The TrkCdn Campaign

The TrkCdn campaign exemplifies the malicious use of DNS tunneling to monitor when targets interact with phishing emails. According to Unit 42, this campaign embeds specific DNS queries in email content, which, when activated, connect to attacker-controlled subdomains. These subdomains carry encoded information, such as the MD5 hash of the victim's email address, and direct to a central IP address that returns tailored, malicious content.

"This centralized approach allows attackers to systematically gauge the effectiveness of their phishing attacks and adjust their tactics in real time," explained a Unit 42 researcher.

Network Vulnerability Scans: The SecShow Campaign

Another campaign identified by Unit 42, dubbed "SecShow," uses DNS tunneling to perform reconnaissance on network layouts. By embedding IP addresses and timestamps into DNS queries, attackers can map network configurations and identify exploitable weaknesses. The periodic repetition of these queries enables continuous monitoring and real-time data collection.

Unit 42 emphasizes the stealth and efficiency of DNS tunneling, which allows it to bypass traditional security tools and remain under the radar.

Recommendations for Organizations

In light of these findings, Unit 42 advises organizations to adopt robust DNS monitoring and analysis tools to identify and mitigate unusual traffic patterns. Limiting DNS resolvers to essential queries can also reduce the risk of DNS tunneling misuse.

"By understanding and preparing for these DNS-based threats, organizations can better defend against the evolving landscape of cyber threats," stated a Unit 42 executive.

The discovery of these campaigns underscores the necessity for advanced cybersecurity measures to combat the sophisticated use of DNS tunneling in modern cyberattacks.


bottom of page