Unit 42 Uncovers DNS Tunneling Tactics in Cyber Espionage Campaigns
May 14, 2024
Palo Alto Networks uncovers advanced threat campaigns using DNS tunneling for tracking and scanning activities.
Unit 42 reports attackers track user interactions with CDN-hosted content and measure phishing success through DNS requests.
Threat actors exploit DNS tunneling to probe network infrastructure and launch reflection attacks by finding open resolvers.
To mitigate these cybersecurity risks, organizations should deploy software to detect abnormal DNS traffic and update systems regularly.
Experts, including Elizabeth Montalbano, highlight the importance of vigilance against suspicious links to prevent such infiltrations.
Summary based on 3 sources
Get a daily email with more Tech stories
Sources

Dark Reading • May 14, 2024
DNS Tunneling Abuse Expands to Tracking & Scanning Victims
SecurityWeek • May 14, 2024
Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks
Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News • May 14, 2024
DNS Tunneling Used for Stealthy Scans and Email Tracking