DNS records can now hide malware

We may need to watch for this. I spotted this article on Mastodon titled Hackers exploit a blind spot by hiding malware inside DNS records and its written by Dan Goodin.

DNS is used to find out where a domain lives. It can have various types of records, and maybe we can talk about this when we go through NCSAM again this October.

Text records are such records, and I’m not exactly sure what they do. I understand it in practice, but never really understood how it all works.

But if any records can be used to hide malware, it could be bad news for all unsuspecting individuals just browsing to a site they know and love.

Please check out the article for more info.


Discover more from The Technology blog and podcast

Subscribe to get the latest posts sent to your email.

One thought on “DNS records can now hide malware

  1. Hi.
    I am unsure how we could secure our reccords exactly however an interesting article I read kinda puts this in prospective.
    This time with sites that expire and are not renewed in a timely manner.
    Ai and somethingg else was leveraged.
    https://www.rnz.co.nz/news/in-depth/567221/how-a-local-website-was-hijacked-and-filled-with-ai-generated-coherent-gibberish

    This stuff is going to happen more and more but then this wasn’t really news to the net, it is the real world except it doesn’t take a break.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.