• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
zloader malware returns with dns tunneling to stealthily mask c2

ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

You are here: Home / General Cyber Security News / ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms
December 11, 2024

Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS) tunnel for command-and-control (C2) communications, indicating that the threat actors are continuing to refine the tool after resurfacing a year ago.

“Zloader 2.9.4.0 adds notable improvements including a custom DNS tunnel protocol for C2 communications and an interactive shell that supports more than a dozen commands, which may be valuable for ransomware attacks,” Zscaler ThreatLabz said in a Tuesday report. “These modifications provide additional layers of resilience against detection and mitigation.”

Cybersecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


ZLoader, also referred to as Terdot, DELoader, or Silent Night, is a malware loader that’s equipped with the ability to deploy next-stage payloads. Malware campaigns distributing the malware were observed for the first time in almost two years in September 2023 after its infrastructure was taken down.

In addition to incorporating various techniques to resist analysis efforts, the malware has been found to make use of a domain generation algorithm (DGA) and take steps to avoid being run on hosts that differ from the original infection, a technique also spotted in the Zeus banking trojan it’s based on.

DNS Tunneling

In recent months, the distribution of ZLoader has been increasingly associated with Black Basta ransomware attacks, with threat actors deploying the malware by means of remote desktop connections established under the guise of fixing a tech support issue.

The cybersecurity firm said it discovered an additional component in the attack chain that first involves the deployment of a payload called GhostSocks, which is then used to drop ZLoader.

“Zloader’s anti-analysis techniques such as environment checks and API import resolution algorithms continue to be updated to evade malware sandboxes and static signatures,” Zscaler said.

Cybersecurity

A new feature introduced in the latest version of the malware is an interactive shell that enables the operator to execute arbitrary binaries, DLLs, and shellcode, exfiltrate data, and terminate processes.

While Zloader continues to use HTTPS with POST requests as the primary C2 communication channel, it also comes with a DNS tunneling feature to facilitate encrypted TLS network traffic using DNS packets.

“Zloader’s distribution methods and a new DNS tunneling communication channel suggest the group is focusing increasingly on evading detection,” the company said. “The threat group continues to add new features and functionality to more effectively serve as an initial access broker for ransomware.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «chinese eaglemsgspy spyware found exploiting mobile devices since 2017 Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017
Next Post: Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts microsoft mfa authquake flaw enabled unlimited brute force attempts without alerts»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
  • When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
  • Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

Copyright © TheCyberSecurity.News, All Rights Reserved.