See every side of every news story
Published loading...Updated

Hackers exploit a blind spot by hiding malware inside DNS records

GLOBAL, JUL 16 – Hackers use DNS tunneling and multiple record types to evade detection, exploiting a largely unmonitored DNS infrastructure for command-and-control and data theft, researchers say.

Summary by Ars Technica
Hackers are stashing malware in a place that’s largely out of the reach of most defenses—inside domain name system (DNS) records that map domain names to their corresponding numerical IP addresses. The practice allows malicious scripts and early-stage malware to fetch binary files without having to download them from suspicious sites or attach them to emails, where they frequently get quarantined by antivirus software. That’s because traffic for…

7 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 50% of the sources lean Left, 50% of the sources are Center
50% Center
Factuality

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

Ars Technica broke the news in United States on Wednesday, July 16, 2025.
Sources are mostly out of (0)