Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

US Army announces contract worth up to $20 billion with Anduril

Honda will discontinue EVs and have no chance of competing in the future.

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hazy Hawk Exploites DNS Records hijack CDC to hijack CDC, the corporate domain for malware delivery
Identity

Hazy Hawk Exploites DNS Records hijack CDC to hijack CDC, the corporate domain for malware delivery

By May 20, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 20, 2025Ravi LakshmananMalware/Cloud Security

Threat actors known as Hazy Hawk have been observed hijacking abandoned cloud resources from well-known organizations, such as Amazon S3 buckets and Microsoft Azure endpoints, by leveraging false mining in domain name systems (DNS) records.

According to InfoBlox, hijacked domains are used to host URLs that users direct fraud and malware through their traffic delivery system (TDSES). Other resources taken away by threat actors include resources hosted on Akamai, Bunny CDN, CloudFlare CDN, GitHub, and Netlify.

The DNS threat intelligence company said it first discovered threat actors after gaining control of several subdomains associated with the Centers for Disease Control and Prevention (CDC) in February 2025.

Since then, other government agencies around the world, well-known universities, international companies such as Deloitte, PricewaterhouseCoopers and Ernst & Young have been determined to have been victimized by the same threat actors since at least December 2023.

Cybersecurity

“Arguably the most notable thing about Haze Hawk is that these difficult, vulnerable domains with connections to respected organizations are not used for spying or “high-brow” cybercrime,” said Jacques Portal and Renée Burton of Infoblox in a report shared with Hacker News.

“Instead, they feed the suspicious underworld of AdTech, whipping victims into a wide range of scams and fake applications, and using browser notifications to trigger a process that has long-lasting impact.”

What’s noteworthy about Hazy Hawk’s work is hijacking trustworthy and reputable domains belonging to legitimate organizations, so it increases the reliability of search results when used to provide malicious spam content. But even more worrying, this approach allows threat actors to bypass detection.

Supports the operation is the ability of an attacker to hang DNS CNAME records and seize control of abandoned domains. This is a technology previously exposed by Guardio in early 2024 as being exploited by bad actors for spam growth and click monetization. All that a threat actor needs to do is register the missing resources and hijack the domain.

Hacker News

Hazy Hawk goes a step further by finding abandoned cloud resources and directing them for malicious purposes. In some cases, threat actors employ URL redirection techniques to hide which cloud resources have been hijacked.

“We use the name hazy hawk for this actor to hang DNS CNAME records and find and hijack cloud resources to use in malicious URL distributions,” says Infoblox. “Domain hijacking components may be provided as a service and may be used by a group of actors.”

Attack chains often clone the contents of the legal site of the first site hosted in a hijacked domain, and invite the victim to visit with pornographic or pirated content. Visitors to the site then leak through TDS and decide where to land next.

Cybersecurity

“Hazy Hawk is one of dozens of threat actors to track in the world of ad affiliate marketing,” the company said. “Threat actors belonging to affiliate advertising programs are encouraged to include requests that drive users to tailored malicious content and allow push notifications from the “website” along the redirect path. ”

In doing so, the idea is to flood victims’ devices with push notifications and provide an endless torrent of malicious content. Each notification leads to various scams, scullyware, fake investigations, and involves requests to allow more push notifications.

To prevent and protect haze hawk activity, we recommend that you delete the DNS CNAME record as soon as resources are shut down. On the other hand, end users are encouraged to reject notification requests from unfamiliar websites.

“Operators like Hazy Hawk are responsible for the first lure, but the user who clicks is led into a roughly, malicious, malicious Adtech maze. Hayce Hawk has put a considerable amount of effort into identifying vulnerable domains and using them for fraudulent operations, indicating that these ad affiliate programs have been successful in paying well.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhich casino games will be the biggest in the future?
Next Article New Scanner Technology in Stock Market Guide shows historical track record for each trade setup found

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

US Army announces contract worth up to $20 billion with Anduril

Honda will discontinue EVs and have no chance of competing in the future.

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

As people look for ways to make new friends, here are some apps that may come in handy.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.