• About Us
  • Privacy
  • Terms
    • DMCA
  • AdChoices
  • Contact Us
  • Careers
  • Dictionary
  • Donate
No Result
View All Result
Nyongesa Sande
  • Radio
  • Events
  • How To
  • AI
  • Business
    • Shop
    • Money
    • Billionaires
  • Finance
  • Gadgets
  • Lifestyle
  • Sports
  • Autos
Nyongesa Sande
No Result
View All Result
  • Radio
  • Events
  • How To
  • AI
  • Business
  • Finance
  • Gadgets
  • Lifestyle
  • Sports
  • Autos

Home » Hackers Now Using DNS Records to Sneak in Malware

Hackers Now Using DNS Records to Sneak in Malware

July 20, 2025
in Cybersecurity
Reading Time: 3 mins read
A A
Cybersecurity

Cybersecurity

FacebookXTelegramWhatsappLinkedIn

Cybercriminals have found a clever new method of delivering malware—by exploiting one of the internet’s most trusted systems: the Domain Name System (DNS). According to a new report by DomainTools, attackers are now using DNS records to sneak in malware, bypassing firewalls, antivirus software, and email filters with ease.

ADVERTISEMENT

The technique leverages TXT records, a legitimate but rarely monitored part of DNS, to encode and distribute malicious payloads discreetly. The rise of encrypted DNS protocols like DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) only complicates detection further.


How DNS TXT Records Are Being Weaponized

The attack begins when the malware is converted into hexadecimal format, transforming the binary data into readable strings of letters and numbers. These strings are then split into hundreds of chunks, each placed into the TXT record of a separate subdomain under a domain such as whitetreecollective[.]com.

Once a hacker gains limited access to a target’s network, they execute seemingly innocent DNS queries to collect the chunks piece by piece. These are later reassembled and decoded into a fully functional malware strain—without triggering any security alerts.

ADVERTISEMENT

The malware in question includes samples like Joke Screenmate, a payload known for stealth and persistence. What makes this method dangerous is its reliance on a commonly trusted, yet poorly monitored protocol.


Encrypted DNS Makes Detection Harder

While DNS encryption via DoH and DoT is great for user privacy, it also blinds network security tools. Unless an organization operates its own DNS resolvers with deep packet inspection, it becomes extremely difficult to see or block these stealthy DNS requests.

Ian Campbell, Senior Security Operations Engineer at DomainTools, warns that “even well-equipped organizations struggle to identify malicious DNS activity due to the opaque nature of encrypted requests.”

This blind spot is now being exploited not only for malware delivery but also for prompt injection attacks—where TXT records are loaded with dangerous AI commands to manipulate chatbots and language models.


How to Protect Against DNS-Based Malware

Cybersecurity teams must now rethink DNS as a potential attack vector. Here’s how to defend against these stealthy threats:

1. Monitor DNS Traffic Proactively

  • Watch for unusual patterns like excessive TXT lookups or frequent subdomain queries.
  • Alert on DNS queries that seem programmatic or suspicious.

2. Use Internal DNS Resolvers

  • Set up logging and inspection for internal DNS servers.
  • Retain query history for forensic analysis.

3. Deploy DNS Firewalls

  • Use DNS-based security tools to detect abnormal record lengths, query frequency, or anomalies in DNS behavior.
  • Block requests to known malicious domains or questionable public DNS resolvers.

4. Restrict External DNS Access

  • Only allow outbound DNS to trusted resolvers.
  • Block rogue DNS traffic attempting to bypass corporate controls.

5. Raise Awareness Across Teams

  • Train security staff to recognize DNS-layer attacks.
  • Educate developers and AI teams on prompt injection vectors via DNS TXT records.

Conclusion

The use of DNS records to sneak in malware is a stark reminder that even foundational internet systems can be abused. By encoding malicious payloads in DNS TXT records and hiding behind encrypted protocols, attackers are slipping past traditional defenses unnoticed.

Organizations must adopt a DNS-aware security posture, implementing modern tools, traffic visibility, and user education to mitigate this emerging threat.

Was this article helpful?
YesNo
Tags: Cybersecurity KenyaDNS FirewallDNS Records to Sneak in MalwareDNS TXT MalwareDNS-over-HTTPS Threats
ADVERTISEMENT
Previous Post

Kenyans Have Ditched the Neon Smartphones Despite Local Assembly Efforts

Next Post

Six-Year Flaw in the Safaricom Home Fiber System Finally Patched

RelatedPosts

Cybersecurity Based on Risk and Enhanced by Managed Detection and Response (MDR)
Cybersecurity

Top Cybersecurity Certifications That Pay Well

5 months ago

Cybersecurity is one of the fastest-growing fields in tech, and demand for certified professionals has never been higher. Companies across...

Malware that steals Facebook accounts
Cybersecurity

Malware that steals Facebook accounts

2 years ago

Our researchers have discovered a new version of malware from the Ducktail family. Cybercriminals are using it to target company employees who...

What is Anti-Aliasing?
Cybersecurity

The top-10 mistakes made when configuring enterprise IT systems

2 years ago

Errors in configuring IT infrastructure are a regular occurrence at large organizations — even given the most mature and competent...

Cybersecurity

Boramae Ransomware

8 months ago

Cybersecurity researchers have uncovered a new ransomware variant named Boramae, which poses a serious risk to Windows-based systems. First detected...

Cybersecurity Based on Risk and Enhanced by Managed Detection and Response (MDR)
Cybersecurity

Top 25 Best Cybersecurity Companies in the World

10 months ago

Cybersecurity companies are crucial in protecting businesses, individuals, and governments from the increasing threat of cyber-attacks. With cybercrime on the...

What is Anti-Aliasing?
Cybersecurity

What is a compromise assessment service?

2 years ago

A question for many businesses these days isn’t “Will we get hacked?” but rather, “Might we have already been hacked...

Reptar: a vulnerability in Intel processors
Cybersecurity

Reptar: a vulnerability in Intel processors

2 years ago

On November 14, Google released a bulletin reporting a serious vulnerability in a number of Intel processors — starting from the Ice Lake generation...

Cyber crimes in Qatar: The law and how to report them
Cybersecurity

Kenyan Govt Websites among Most Targeted as Cybercrime Surges, Over 840M Threats Detected

10 months ago

NAIROBI, Kenya – Kenya’s critical information infrastructure, including government websites, has emerged as a prime target for cybercriminals following a...

Remcos RAT via Discord
Cybersecurity

Remcos RAT via Discord

2 years ago

Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client. Since the beginning of the...

The Top 6 Digital Crimes in Kenya That Could Land You in Jail
Cybersecurity

The Top 6 Digital Crimes in Kenya That Could Land You in Jail

10 months ago

Kenya's digital space has seen exponential growth, with social media and technology adoption on the rise. However, with this growth...

Load More
Next Post
Six-Year Flaw in the Safaricom Home Fiber System Finally Patched

Six-Year Flaw in the Safaricom Home Fiber System Finally Patched

WhatsApp Working on Quick Recap Feature for Multi-Chat Summaries

WhatsApp Working on Quick Recap Feature for Multi-Chat Summaries

ADVERTISEMENT
Nyongesa Sande

Nyongesa Sande delivers breaking news, technology updates, billionaire profiles, inventions, AI trends, and inspiring facts.

  • About Us
  • Privacy
  • Terms
  • AdChoices
  • Contact Us
  • Careers
  • Dictionary
  • Donate

©2025 Nyongesa Sande. All rights reserved.

No Result
View All Result
  • Tech News
  • Banking
  • Biography
  • Politics
  • Presidents
  • How To
  • Wiki
  • Real Estate
  • Health
  • Gadget Reviews
  • Top 10
  • History
  • Companies
  • Sports
  • Loans
  • Finance
  • Travel
  • Breaking News
  • AI
  • Electric Vehicle
  • Motivation
  • Phone Prices
  • Hosting
  • Shopping Malls
  • Africa
  • Business
  • Insurance
  • Restaurants
  • Investment
  • Classifieds
  • KenyanBaze
  • Shop Anything

©2025 Nyongesa Sande. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.