Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
EdgeStepper Implant Deploys Malware by Rerouting DNS Queries
Advertisements

A malicious implant identified as EdgeStepper has been observed actively rerouting DNS queries on compromised systems to deploy malware. The implant’s primary function is to manipulate network traffic at a fundamental level to facilitate further infection.

By intercepting and altering DNS requests, EdgeStepper redirects targeted devices to attacker-controlled servers. This tactic is a form of DNS hijacking executed locally on the infected machine, making it a stealthy method for controlling a system’s network communications.

DNS Hijacking for Malicious Payload Delivery

The core mechanism of the EdgeStepper implant involves its ability to monitor outgoing DNS traffic. When a user or an automated process on the compromised system attempts to connect to a legitimate software update server, EdgeStepper intervenes. It forges a DNS response, pointing the system not to the genuine server, but to one operated by the attackers.

This rerouting is central to the implant’s operation. The victim’s system, trusting the falsified DNS information, then initiates a connection with the malicious server under the pretense of performing a routine action, such as downloading a software patch or update.

Weaponizing Legitimate Software Update Channels

Once the connection is established with the attacker-controlled infrastructure, the threat actors leverage the hijacked software update process. Instead of receiving a legitimate update file, the system is served a malicious payload. This method allows attackers to disguise their malware as a trusted and expected file transfer.

The delivery of malware through this hijacked channel completes the infection chain initiated by EdgeStepper. The technique exploits the inherent trust users and systems place in the software update mechanism, turning a standard security process into a vehicle for malware deployment.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading