Get the latest tech news

Hackers exploit a blind spot by hiding malware inside DNS records


Technique transforms the Internet DNS into an unconventional file storage system.

The practice allows malicious scripts and early-stage malware to fetch binary files without having to download them from suspicious sites or attach them to emails, where they frequently get quarantined by antivirus software. Researchers from DomainTools on Tuesday said they recently spotted the trick being used to host a malicious binary for Joke Screenmate, a strain of nuisance malware that interferes with normal and safe functions of a computer. Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.

Get the Android app

Or read this on ArsTechnica

Read more on:

Photo of DNS

DNS

Photo of Hackers

Hackers

Photo of malware

malware

Related news:

News photo

Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years

News photo

A Little-Known Microsoft Program Could Expose the Defense Department to Hackers

News photo

Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years | “All of the knowledge to generate the exploit already exists on the internet. AI could even build it for you,” the researcher told 404 Media.