Malware found embedded in DNS, the system that makes the internet usable, except when it doesn't
Fortunately, the example provided appears to be "prank software" rather than more sophisticated malware.

DomainTools reported that someone found a way to embed malware in Domain Name System (DNS) records, which means we have something new to blame on the system responsible for pretty much every networking problem most people may have.
For anyone fortunate enough not to know already, DNS is the system that enables you to enter something like "tomshardware.com" in your browser's address bar and, ideally, be taken to the IP address associated with our site. Without it we'd have to enter those IP addresses manually—with no guarantee that an IP address that worked yesterday will continue to work today. Why? Because the most common Internet Protocol, IPv4, didn't account for the sheer number of devices we'd all want to put online, and its successor, IPv6, still isn't supported as well as it should be.
So we have DNS. The process goes something like this: a website uses DNS records to indicate what IP address should be associated with its domain name, browsers query DNS providers for those records when someone asks to visit a website, and then, if everything goes well, the site and its visitor are connected by the wonders of the web. (By which I mean the collection of interconnected protocols and services that are far more complicated than I've conveyed in this overview.) DNS is ubiquitous—which means it was only a matter of time before someone found a way to abuse it.
The first step towards exploiting DNS in ways beyond its intended usage was taken when Ben Cartwright-Cox outlined a way to establish a file system on top of DNS. That system should be limited to plain text, but Cyber Security News then reported in June that hackers were hiding images in DNS records, which prompted DomainTools to begin "a search at the beginning of DNS RDATA TXT records for magic file bytes in hexadecimal format for a wide range of executables and common file types." And it found some! Which means there's more 'splainin to do.
Most of us identify a file's type by the extension included at the end of its name: .mp3 for audio files, .txt for plain text, and so on. But in most cases there isn't anything special about the extension—which is why you can't necessarily turn a JPEG into a PNG, for example, simply by changing its name from "example.jpg" to "example.png" in a file manager. (Which is why some file managers hide filename extensions by default.) Instead, a file communicates its type by way of "magic file bytes" embedded inside of it, which programs then use to figure out how they're supposed to handle the file.
Now that we've established that computers are cursed, especially when we expect them to communicate with each other by way of a bunch of intermediary computers that we pretend don't exist, let's continue with DomainTools' discovery.
The company said that "a malicious actor was using DNS TXT records to store and possibly deliver [Joke/ScreenMate] malware and stagers for likely Covenant C2 malware infections" from 2021-2022. DomainTools described that malware as "prank software" that can be used to cause system performance issues; "present a continuous stream of jokes, images, or animations that can be distracting and difficult to stop"; and "display fake error messages, fictitious virus warnings, or animations that mimic the deletion of system files," among other things, on infected devices.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
It would be interesting to see if more hackers start to take advantage of DNS like this, especially since these reports have demonstrated the relative ease with which the system can be used to hide non-text information, deploy malware, etc.
Follow Tom's Hardware on Google News to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

Nathaniel Mott is a freelance news and features writer for Tom's Hardware US, covering breaking news, security, and the silliest aspects of the tech industry.
-
Jame5 Dumb question: Wouldn't the easiest solution be to make sure that all DNS resolvers only handle plain text responses, with any other magic-byte embedded payloads being dropped on the floor?Reply -
d0x360 The Internet was not designed to be secure, not really anyway. Its time to start taking steps to deploy 'internet 2' already used in some colleges (etc) to everyone. It's faster & more efficient but more importantly it's actually designed with security in mind.Reply
What we have now served it's purpose but the number of ways an attacker can come at you is staggering & of a threat actor really wants to target someone and can put in the time.. they will succeed. It requires significant skill but that's what happens when a complex system isn't designed to be secure. Doesn't help that we keep putting band-aids on the wounds and adding functionality on top of the proverbial screen door on a submarine. -
EduApps
Because not everything is plain text just like the web page you see Right now (you could include images in this category, I'll explain later (TCP is slower, but safer intrgrity)).Jame5 said:Wouldn't the easiest solution be to make sure that all DNS resolvers only handle plain text responses, with any other magic-byte embedded payloads being dropped on the floor?
In the internet you can have complex responses, like a voip call or even a YouTube stream (UDP, which means more speed and interference) which is essentially the "magic-byte payload" you're talking about.
While TCP is safer in integrity, a Man-In-The-Middle attack could replace all of your browser images for a beautiful potato picture. Which it looks like it could been happening here.
You can't just cut off from the internet something just because it looks like a byte stream. In fact, the plain text you see is a human-readable format of the so called "magic byte payload".
Edit: Note that even plain text has its byte encoding like UTF-8 or the dino ASCII and I'm not taking it into account because we have ways to detect if something is structured bytes or plain text. -
Daniel15
That's easily bypassable by base64-encoding the payload.Jame5 said:Dumb question: Wouldn't the easiest solution be to make sure that all DNS resolvers only handle plain text responses, with any other magic-byte embedded payloads being dropped on the floor? -
Jame5 If you think DNS can handle UTF8-encoding, you underestimate how old the protocol is.Reply
To the other point, even with a base64 payload, if you treat it as plain text, nothing happens. Base64 encoding is only dangerous if it is decoded rather than treated as a string by the resolver. Unless the dns resolver code in your cli or browser is for some reason designed to handle and decode base64 or really anything except basic ASCII, it's false to assume that it would cause problems other than being unable to be resolved.
You both seem to be conflating DNS resolution with other forms of TCP/UDP communication. -
DS426
Ok, but to be fair, you're talking about internet 1.0 era technologies as well, such as email. Email alone is the initial cause for 70-90% of data breaches, so a "secure" "email 2.0" would be huge in itself. It's also a herculean effort already to replace email as it exits today, which is why it also continues to receive bolt-ons like DKIM, DMARC, ARC Sealing, DNS DANE, and so on. There's a reason for that though: sometimes things just need evolution, not a revolution.d0x360 said:...
What we have now served it's purpose but the number of ways an attacker can come at you is staggering & of a threat actor really wants to target someone and can put in the time.. they will succeed. It requires significant skill but that's what happens when a complex system isn't designed to be secure. Doesn't help that we keep putting band-aids on the wounds and adding functionality on top of the proverbial screen door on a submarine.
Much of the world's population grew up during that era or even prior -- it's really about minds and awareness. Social engineering isn't close to being beaten and if anything is only swinging in attackers' favors as you see those kids in the U.K. and elsewhere hacking Microsoft, nVidia, and more recently huge grocery chains, airlines, etc. (look up "Lapsus$" and "Scattered Spider") using simple IT help desk tricks.
Anyways, modern hacking doesn't require significant skill as there's more and more open source and low cost tooling like phishing kits and Phishing-as-a-Service, Malware-as-a-Service, separation of Initial Access Brokers from the operating ransomware affiliate or other form of bad actor, and so on. Script Kiddies, a class of unethical hacker, are prevalent and proliferate as ever, and really a full-spectrum scale of skills and knowledge in between. So I suppose to your point, band-aided technologies have only compounded this problem, but I believe it's more of a human problem than a technology one. Look at how many billions of dollars scammers are scamming people without even a need for hacking networks or devices... just hacking the human mind!
On that bombshell... an honorable mention to the late Kevin Mitnick! 🫡 -
Geef DS426 said:Ok, but to be fair, you're talking about internet 1.0 era technologies as well, such as email. Email alone is the initial cause for 70-90% of data breaches, so a "secure" "email 2.0" would be huge in itself.
To get to the stupid massive populace of the world just give them that basic info. 70-90% of breaches are email 1.0. Email 2.0 is secure.
Most won't know 1.0 from 2.0 so there would need to be something really basic that everyone could identify that would let people know they are using 2.0. (Imagine the spam messages in old email. 'Click me! I'm the new email type!) -
suspiciouslow This is massively old news. DNS has been used for data transfer for well over a decade. Hell I got my B.S. in 2017 doing data transfer via embedded NTP traffic.Reply -
Daniel15
I'm not conflating anything. The point is that it can be used to store malware payloads. Instead of a script downloading the payload from a URL, it can be stored directly in a DNS record. Everyone is scanning URLs for malicious content, but I doubt many systems are scanning for malware directly in TXT records.Jame5 said:To the other point, even with a base64 payload, if you treat it as plain text, nothing happens. Base64 encoding is only dangerous if it is decoded rather than treated as a string by the resolver -
Daniel15
I wonder if we'll ever get an email 2.0. There's still no widely-accepted email protocols that even handle two factor authentication - neither IMAP nor SMTP do. JMAP might, but it hasn't been widely adopted yet. It'd be nice to move to a stateless protocol too.Geef said:To get to the stupid massive populace of the world just give them that basic info. 70-90% of breaches are email 1.0. Email 2.0 is secure