ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    DNSMessenger malware

    IT Discussion
    dnsmessenger malware
    6
    9
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DanpD
      Danp
      last edited by

      New Fileless Malware Uses DNS Queries To Receive PowerShell Commands

      https://thehackernews.com/2017/03/powershell-dns-malware.html

      1 Reply Last reply Reply Quote 1
      • DashrenderD
        Dashrender
        last edited by

        They call it fileless, but it takes getting an infected Word document to execute on the machine first, right? So how is this fileless?

        1 Reply Last reply Reply Quote 2
        • Reid CooperR
          Reid Cooper
          last edited by

          It is listed as a Trojan, specifically a Remote Access Trojan or RAT. So definitely a file. But the commands that make it scary are in DNS, not in the Trojan file. I think that that is why they use that term. But it is pretty confusing and misleading.

          1 Reply Last reply Reply Quote 3
          • dafyreD
            dafyre
            last edited by

            From my understanding of the article, the bug doesn't actually drop any files on your system. Yes, you do have to open the infected attachment, but the bug it self doesn't leave any files behind.

            1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender
              last edited by

              So there's really no root fly here you have to use another known fly to breed security first and then you can use this DNS hack to give yourself a rat

              1 Reply Last reply Reply Quote 1
              • ObsolesceO
                Obsolesce
                last edited by

                I thought "fileless" meant that once the code executes, it runs inside of an existing process for example, rather than from a file like a normal process.

                I was in a powershell empire webex where this was demonstrated.

                Cool stuff imho.

                1 Reply Last reply Reply Quote 1
                • ObsolesceO
                  Obsolesce
                  last edited by

                  Also, using an infected word doc was just one of many methods to get through. It was the easiest for demonstration purposes anyways.

                  1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender
                    last edited by

                    That's all fine and dandy my point was that this hack is currently worthless on its own it requires a previous hack in order to make this one work

                    JaredBuschJ 1 Reply Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch @Dashrender
                      last edited by

                      @Dashrender said in DNSMessenger malware:

                      That's all fine and dandy my point was that this hack is currently worthless on its own it requires a previous hack in order to make this one work

                      The point is not how the infection was started. The point is that the infection itself is completely fileless. Never writing data to the disk.

                      There are multitudes of ways into a Windows system that an attacker could use to execute the initial code.

                      1 Reply Last reply Reply Quote 1
                      • 1 / 1
                      • First post
                        Last post