Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

With fewer ordinances, seminaries have found ways to serve young professionals in other fields

Beer 2.0: Meme Coin Brewing Something Big in Solana

Wall Street Ponke launches AI tools, learning hubs and over $300,000 in hours

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Hazy Hawk Exploites DNS Records hijack CDC to hijack CDC, the corporate domain for malware delivery
Identity

Hazy Hawk Exploites DNS Records hijack CDC to hijack CDC, the corporate domain for malware delivery

userBy userMay 20, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 20, 2025Ravi LakshmananMalware/Cloud Security

Threat actors known as Hazy Hawk have been observed hijacking abandoned cloud resources from well-known organizations, such as Amazon S3 buckets and Microsoft Azure endpoints, by leveraging false mining in domain name systems (DNS) records.

According to InfoBlox, hijacked domains are used to host URLs that users direct fraud and malware through their traffic delivery system (TDSES). Other resources taken away by threat actors include resources hosted on Akamai, Bunny CDN, CloudFlare CDN, GitHub, and Netlify.

The DNS threat intelligence company said it first discovered threat actors after gaining control of several subdomains associated with the Centers for Disease Control and Prevention (CDC) in February 2025.

Since then, other government agencies around the world, well-known universities, international companies such as Deloitte, PricewaterhouseCoopers and Ernst & Young have been determined to have been victimized by the same threat actors since at least December 2023.

Cybersecurity

“Arguably the most notable thing about Haze Hawk is that these difficult, vulnerable domains with connections to respected organizations are not used for spying or “high-brow” cybercrime,” said Jacques Portal and Renée Burton of Infoblox in a report shared with Hacker News.

“Instead, they feed the suspicious underworld of AdTech, whipping victims into a wide range of scams and fake applications, and using browser notifications to trigger a process that has long-lasting impact.”

What’s noteworthy about Hazy Hawk’s work is hijacking trustworthy and reputable domains belonging to legitimate organizations, so it increases the reliability of search results when used to provide malicious spam content. But even more worrying, this approach allows threat actors to bypass detection.

Supports the operation is the ability of an attacker to hang DNS CNAME records and seize control of abandoned domains. This is a technology previously exposed by Guardio in early 2024 as being exploited by bad actors for spam growth and click monetization. All that a threat actor needs to do is register the missing resources and hijack the domain.

Hacker News

Hazy Hawk goes a step further by finding abandoned cloud resources and directing them for malicious purposes. In some cases, threat actors employ URL redirection techniques to hide which cloud resources have been hijacked.

“We use the name hazy hawk for this actor to hang DNS CNAME records and find and hijack cloud resources to use in malicious URL distributions,” says Infoblox. “Domain hijacking components may be provided as a service and may be used by a group of actors.”

Attack chains often clone the contents of the legal site of the first site hosted in a hijacked domain, and invite the victim to visit with pornographic or pirated content. Visitors to the site then leak through TDS and decide where to land next.

Cybersecurity

“Hazy Hawk is one of dozens of threat actors to track in the world of ad affiliate marketing,” the company said. “Threat actors belonging to affiliate advertising programs are encouraged to include requests that drive users to tailored malicious content and allow push notifications from the “website” along the redirect path. ”

In doing so, the idea is to flood victims’ devices with push notifications and provide an endless torrent of malicious content. Each notification leads to various scams, scullyware, fake investigations, and involves requests to allow more push notifications.

To prevent and protect haze hawk activity, we recommend that you delete the DNS CNAME record as soon as resources are shut down. On the other hand, end users are encouraged to reject notification requests from unfamiliar websites.

“Operators like Hazy Hawk are responsible for the first lure, but the user who clicks is led into a roughly, malicious, malicious Adtech maze. Hayce Hawk has put a considerable amount of effort into identifying vulnerable domains and using them for fraudulent operations, indicating that these ad affiliate programs have been successful in paying well.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhich casino games will be the biggest in the future?
Next Article New Scanner Technology in Stock Market Guide shows historical track record for each trade setup found
user
  • Website

Related Posts

Over 100 fake Chrome extensions found hijacking sessions, credential stealing, ad injections

May 20, 2025

Sidewinder hit South Asia with old office flaws and custom malware

May 20, 2025

AWS default IAM role is known to allow for lateral movement and cross-service exploitation

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

With fewer ordinances, seminaries have found ways to serve young professionals in other fields

Beer 2.0: Meme Coin Brewing Something Big in Solana

Wall Street Ponke launches AI tools, learning hubs and over $300,000 in hours

Thousands of Gaza children face imminent deaths under the siege of Israel: United Nations | Israeli-Palestinian conflict news

Trending Posts

Thousands of Gaza children face imminent deaths under the siege of Israel: United Nations | Israeli-Palestinian conflict news

May 20, 2025

British government suspends free trade talks with Israel over the Gaza War | Israeli-Palestinian conflict news

May 20, 2025

UEFA Europa League Final: Man UTD vs Tottenham – Start, Team News, Lineup | Football News

May 20, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beer 2.0: Meme Coin Brewing Something Big in Solana

Wall Street Ponke launches AI tools, learning hubs and over $300,000 in hours

New Scanner Technology in Stock Market Guide shows historical track record for each trade setup found

Which casino games will be the biggest in the future?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.