web analytics

New Decoy Dog Malware Toolkit Targets Enterprise Networks – Source: heimdalsecurity.com

new-decoy-dog-malware-toolkit-targets-enterprise-networks-–-source:-heimdalsecurity.com
#image_title
Rate this post

Source: heimdalsecurity.com – Author: Madalina Popovici

A new, sophisticated malware toolkit called Decoy Dog was discovered after cybersecurity researchers analyzed more than 70 billion DNS records belonging to enterprise networks.

To avoid detection, Decoy Dog uses stealthy methods like strategic domain aging and DNS query dribbling, in which a steady stream of queries is sent to the command-and-control (C2) domains.

The malware was discovered in early April 2023 after anomalous DNS beaconing activity, and the researchers claim that the malware’s unusual characteristics allowed them to map additional domains used in the attack infrastructure.

Decoy Dog is a cohesive toolkit with a number of highly unusual characteristics that make it uniquely identifiable, particularly when examining its domains on a DNS level.

Source

However, Decoy Dog’s actual use in the wild is “very rare,” with the DNS signature matching less than 0.0000027% of the 370 million active domains on the internet.

Pupy RAT, the Primary Malware Component

One of the main components of the toolkit is Pupy RAT, an open source trojan that is delivered through DNS tunneling, a method that uses DNS queries and responses as a C2 for dropping payloads in a stealthy manner.

Decoy Dog C2 Domains

Source

Although there is no evidence linking Earth Berberoka (aka GamblingPuppet), a Chinese nation-state actor, to this campaign, his name has been previously associated with the use of the cross-platform Pupy RAT, explains THN.

Three different infrastructure configurations have been detected to date, suggesting that the Decoy Dog operation had been running for at least a year before its discovery.

In addition, Decoy Dog domains have been observed to exhibit some peculiar DNS beaconing behavior, including making periodic but infrequent DNS requests.

Decoy Dog domains can be grouped together based on their shared registrars, name servers, IPs, and dynamic DNS providers. Given the other commonalities between Decoy Dog domains, this is indicative of either one threat actor gradually evolving their tactics, or multiple threat actors deploying the same toolkit on different infrastructure.

Source

The complete technical analysis published by Infoblox is available here.

Check out the following if you want to learn more about DNS security, DNS filtering, and DNS best practices.

If you liked this article, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

If you liked this post, you will enjoy our newsletter.

Get cybersecurity updates you’ll actually want to read directly in your inbox.

Original Post URL: https://heimdalsecurity.com/blog/new-decoy-dog-malware-toolkit-targets-enterprise-networks/

Category & Tags: Cybersecurity News – Cybersecurity News

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts