Original Article Text

Click to Toggle View

Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains. A threat actor tracked as 'Hazy Hawk' is hijacking forgotten DNS CNAME records pointing to abandoned cloud services, taking over trusted subdomains of governments, universities, and Fortune 500 companies to distribute scams, fake apps, and malicious ads. According to Infoblox researchers, Hazy Hawk first scans for domains with CNAME records pointing to abandoned cloud endpoints, which they determine via passive DNS data validation. Next, they register a new cloud resource with the same name as the one in the abandoned CNAME, causing the original domain's subdomain to resolve to the threat actor's new cloud-hosted site. Using this technique, the threat actors hijacked multiple domains to cloak malicious activities, host scam content, or use them as redirection hubs for scam operations. Some notable examples of the hijacked domains include: The complete list of compromised domains can be found in the Infoblox report. Once the threat actor gains control of a subdomain, they generate hundreds of malicious URLs under it, which appear legitimate in search engines due to the parent domain's high trust score. Victims clicking on the URLs are redirected through layers of domains and TDS infrastructure that profile them based on their device type, IP address, VPN use, etc., to qualify victims. Infoblox's report says the sites are used for tech support scams, bogus antivirus alerts, fake streaming/porn sites, and phishing pages. Users tricked into allowing browser push notifications get persistent alerts even after they leave the scam sites, which can generate significant revenue for Hazy Hawk. The same researchers reported previously about another threat actor, 'Savvy Seahorse,' who also abused CNAME records to build an atypical TDS that redirected users to fake investment platforms. It's easy to overlook CNAME records, so they are prone to stealthy abuse, and it appears that an increasing number of threat actors realize this and attempt to take advantage. In the case of Hazy Hawk, the operation's success also relies on organizations failing to delete DNS records after cloud services are decommissioned, which permits attackers to replicate the original resource name without authentication. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

CYBERCRIME // Hazy Hawk Exploits DNS Flaws to Hijack High-Trust Domains

'Hazy Hawk' cyber gang hijacks subdomains of prominent organizations through DNS misconfigurations.

Targets include governments, universities, and Fortune 500 companies, using abandoned CNAME records of cloud services.

The threat actor creates malicious sites that appear legitimate by inheriting the trust score of the hijacked domain.

Hijacked domains are used for various scams, distributing fake apps, and serving malicious advertisements.

Victims redirected to these sites are subjected to profiling and targeted with tech support scams, false security alerts, and phishing operations.

Persistent browser push notifications are used to continue scamming victims even when they leave the initial site.

The exploitation relies heavily on organizations not removing outdated DNS records, making it easy for attackers to take control.

Increased awareness of the vulnerability of CNAME records is suggested to help defend against such attacks.