Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

5/31/2016
01:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Wekby 'Pisloader' Abuses DNS

New malware family 'pisloader' uses DNS requests for command and control.

As enterprise IT continues to ignore the security of outbound DNS traffic, the criminals are starting to take advantage of the blind spot. Researchers with Palo Alto Networks last week found yet another prime example of attacker preference for DNS last week with the emergence of a new malware variant that uses DNS requests as cover for its command-and-control (C2) communication with infected network assets.

Dubbed "pisloader" by Palo Alto's Unit 42 research team in its report last week, the new malware shows some striking similarities to the HTTPBrowser family in its command structure and naming conventions, as well as its metadata. It is another product of the Wekby crime group, which is known for its rampant use of HTTPBrowser, which leads researchers to believe that pisloader is a variant of that malware family.

The biggest highlight of the new variant is its use of DNS as a C2 protocol, but it is armed with other obfuscation techniques to make security researchers' jobs more difficult, including using return-oriented programming and garbage assembly instructions in the payload. 

"The malware is actually quite simplistic once the obfuscation and garbage code is ignored. It will begin by generating a random 10-byte alpha-numeric header. The remaining data is base32-encoded, with padding removed. This data will be used to populate a subdomain that will be used in a subsequent DNS request for a TXT record," write the researchers. "The use of DNS as a C2 allows pisloader to bypass certain security products that may not be inspecting this traffic correctly."

According to the 2016 Cisco Annual Security Report, approximately 69% of organizations today don't monitor or control recursive DNS traffic. Attackers love this visibility gap and Cisco reports that 92% of malware today uses DNS to establish C2 communication, exfiltrate data, or redirect traffic.

Specifically using DNS for C2 is not necessarily standard operating procedure for malware today, but the practice is growing in prevalence and pisloader is one among several notable samples picking up on this in the last few years, including the PlugX remote access tool (RAT) and the C3PRO-RACCOON malware that was highlighted by Forcepoint Security Labs in its in-depth study of the Jaku botnet this spring.

In the same vein, attackers are also taking advantage of DNS as a way to exfiltrate data by using DNS tunneling tools to encode data and utilize outbound Port 53 traffic to fly under the radar of many filtering tools. Earlier this month, FireEye recently brought attention to an example of a malware sample using DNS exfiltration that has been plaguing banks in the Middle East.

Security experts warn that enterprises need to take better care monitoring controlling DNS traffic, particularly outbound Port 53 traffic, in order to get a handle on threats like pisloader that will increasingly hit their networks as the crooks try to press their advantage.

"DNS is this underlying infrastructure of the entire Internet and a lot of times it's not given very much attention," says Angela Knox, senior director of engineering and threat research at network security firm Cloudmark. "But because it's so ubiquitous and often not given attention, it's a really great channel for the malicious actors to use."

Related Content:

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21196
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.