TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
This Week in Enterprise Tech (Audio)
00:00
Malicious actors exploit DNS to install hidden proxy server
In this chapter, the hosts discuss a new type of malware that poses a threat to users by masquerading as a legitimate program during installation. The malware creates a hidden proxy server on the user's system, allowing threat actors to maintain a backdoor and redirect network traffic. The researchers also highlight the use of DNS over HTTPS to conceal the command and control communications of the malware.
Play episode from 01:48
Transcript


