Today's AI/ML headlines are brought to you by ThreatPerspective

Digital Event Horizon

Hacking the Blind Spot: DNS Records Become a New Frontline for Malware Distribution



Hackers are stashing malware in a previously unseen location: inside domain name system (DNS) records. This technique exploits the DNS system's blind spot, allowing attackers to distribute malicious files without being detected by traditional security tools. As encrypted forms of IP lookups become more widespread, this method is expected to increase, highlighting the need for improved DNS security and awareness about emerging threats.


  • Researchers have discovered a novel technique used by hackers to hide malware within DNS records.
  • The technique involves converting binary files into hexadecimal format and breaking them down into smaller chunks stored in different DNS records.
  • This method enables malware to be retrieved through innocuous-looking DNS requests, making it difficult for security software to detect malicious activity.
  • Even sophisticated organizations with their own DNS resolvers struggle to distinguish authentic from anomalous requests due to this technique.
  • The adoption of this technique is expected to increase as encrypted forms of IP lookups become more widespread.
  • R researchers have found instances of text embedded in DNS records for use in hacking AI chatbots through prompt injections.
  • There are far-reaching implications for cybersecurity, and security professionals must stay vigilant and update their defenses accordingly.



  • In a shocking discovery, researchers from DomainTools have identified a novel technique used by hackers to hide malware within domain name system (DNS) records. This exploitation of the DNS system's blind spot has significant implications for cybersecurity, as it allows attackers to distribute malicious files without being detected by traditional security tools.


    The technique in question involves converting binary files into hexadecimal format and then breaking them down into smaller chunks, each stored within a different DNS record on a compromised domain. This method enables the malware to be retrieved through innocuous-looking DNS requests, making it difficult for security software to detect the malicious activity.

    DomainTools' senior security operations engineer, Ian Campbell, highlighted the significance of this discovery, stating that even sophisticated organizations with their own in-network DNS resolvers struggle to distinguish authentic DNS traffic from anomalous requests. As a result, this technique has been used before for malicious activities, and its adoption is expected to increase as encrypted forms of IP lookups, such as DOH (DNS over HTTPS) and DOT (DNS over TLS), become more widespread.

    Furthermore, researchers have found instances of DNS records containing text for use in hacking AI chatbots through prompt injections. This exploit technique involves embedding attacker-devised text into documents or files being analyzed by the chatbot, taking advantage of large language models' inability to distinguish commands from unauthorized content.

    The use of DNS records as a means of distributing malware has far-reaching implications for cybersecurity. As security tools become more sophisticated, hackers will likely adapt and evolve their tactics, exploiting new vulnerabilities in the system. It is essential that security professionals and organizations remain vigilant and update their defenses accordingly to stay ahead of this emerging threat.

    In light of these findings, it is crucial to acknowledge the importance of DNS security and the need for increased awareness about this blind spot in the cybersecurity landscape. By understanding the tactics used by hackers and staying informed about emerging threats, individuals and organizations can take proactive steps to protect themselves from the risks associated with DNS record-based malware distribution.

    As Campbell aptly put it, "Like the rest of the Internet, DNS can be a strange and enchanting place." It is imperative that we take this analogy seriously and invest in understanding and securing our digital infrastructure to prevent future exploits.




    Related Information:
  • https://www.digitaleventhorizon.com/articles/Hacking-the-Blind-Spot-DNS-Records-Become-a-New-Frontline-for-Malware-Distribution-deh.shtml

  • https://arstechnica.com/security/2025/07/hackers-exploit-a-blind-spot-by-hiding-malware-inside-dns-records/


  • Published: Wed Jul 16 09:39:27 2025 by llama3.2 3B Q4_K_M











    © Digital Event Horizon . All rights reserved.

    Privacy | Terms of Use | Contact Us