Common Information
Type Value
Value
DNS Server - T1584.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may compromise third-party DNS servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for Command and Control (ex: [Application Layer Protocol](https://attack.mitre.org/techniques/T1071)). Instead of setting up their own DNS servers, adversaries may compromise third-party DNS servers in support of operations. By compromising DNS servers, adversaries can alter DNS records. Such control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary.(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye DNS Hijack 2019) Additionally, adversaries may leverage such control in conjunction with [Digital Certificates](https://attack.mitre.org/techniques/T1588/004) to redirect traffic to adversary-controlled infrastructure, mimicking normal trusted network communications.(Citation: FireEye DNS Hijack 2019)(Citation: Crowdstrike DNS Hijack 2019) Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server.(Citation: CiscoAngler)(Citation: Proofpoint Domain Shadowing)
Details Published Attributes CTI Title
Details Website 2023-10-23 3 How an AppleTV may take down your (#IPv6) network - SANS Internet Storm Center
Details Website 2023-10-20 4 What Is a DNS Server? Definition, Purpose, Types of DNS Servers, and Their Safety
Details Website 2023-10-17 1 6 Common Phishing Attacks and How to Protect Against Them
Details Website 2023-10-12 7 What Is DNS? Definition, How It Works Step-by-Step, Security
Details Website 2023-10-05 4 Dancing the night away with named pipes - PIPEDANCE client release — Elastic Security Labs
Details Website 2023-10-02 7 90s Vulns In 90s Software (Exim) - Is the Sky Falling?
Details Website 2023-09-29 2 Internet Egress Security Architecture for AWS Workloads | Part 2 - Isolated VPCs
Details Website 2023-09-21 0 Protecting Uptime Everytime - The Importance of DNS DDoS Defense | Infoblox
Details Website 2023-09-21 1 IoT threats in 2023
Details Website 2023-09-19 0 Why DNS Protection Should Be A Crucial Part In Building Cyber Defense
Details Website 2023-09-18 20 Ransomware Redefined: RedEnergy Stealer-as-a-Ransomware attacks
Details Website 2023-09-07 4 Zero Day Initiative — Looking at the ChargePoint Home Flex Threat Landscape
Details Website 2023-09-07 2 Defending Your Local DNS Infrastructure Is Critical. | NETSCOUT
Details Website 2023-09-01 0 Understanding Malicious Package Attacks and Defense Strategies for Robust Cybersecurity
Details Website 2023-08-29 9 What's in a name? Strange behaviors at top-level domains creates uncertainty in DNS
Details Website 2023-08-28 42 Kaspersky Lab’s technical analysis of Lockbit v3 Builder
Details Website 2023-08-24 18 VexTrio Deploys DNS-based TDS Server
Details Website 2023-08-22 7 ​Hitachi Energy AFF66x | CISA
Details Website 2023-08-12 0 Portmaster: Privacy Oriented Firewall
Details Website 2023-08-12 26 Internet Storm Center Diary 2023-08-12 - SANS Internet Storm Center
Details Website 2023-08-11 2 Researchers Uncover Years-Long Cyber Espionage on Foreign Embassies in Belarus
Details Website 2023-08-11 0 The Ultimate Anonymous On Internet
Details Website 2023-08-10 57 From Google DNS to Tech Support Scam Sites: Unmasking the Malware Trail
Details Website 2023-08-10 4 TunnelCrack vulnerabilities in VPN clients
Details Website 2023-08-09 12 Malware Analysis & Network Forensics — HawkEye