"Hackers Use DNS Tunneling for Network Scanning, Tracking Victims"
Threat actors have been conducting Domain Name System (DNS) tunneling to track when targets open phishing emails and click on malicious links. They are also applying the method to scan networks for vulnerabilities. DNS tunneling involves encoding data or commands sent and retrieved via DNS queries, turning DNS into a covert communications channel. The technique is commonly used by hackers for Command-and-Control (C2) and Virtual Private Network (VPN) operations. This article continues to discuss hackers' use of DNS tunneling in malicious campaigns.
Bleeping Computer reports "Hackers Use DNS Tunneling for Network Scanning, Tracking Victims"
Submitted by grigby1
Submitted by Gregory Rigby
on