5 August 2020

Iranian APT Oilrig becomes the first group to weaponize DNS-over-HTTPS


Iranian APT Oilrig becomes the first group to weaponize DNS-over-HTTPS

Iranian cybercriminal group Oilrig (also known as APT34) became the first APT to use DNS-over-HTTPS (DoH) protocol in their attacks to exfiltrate data from compromised networks.

Vicente Diaz, a malware analyst for antivirus maker Kaspersky, told in a webinar the change happened in May this year when Oilrig added a new tool to its hacking arsenal. Diaz said Oilrig members have begun using the new DNSExfiltrator utility in their cyberattacks.

DNSExfiltrator is an open-source project available on GitHub that allows users to create covert communication channels by channeling data and hiding it in non-standard protocols. The tool can transfer data between two points using classic DNS requests, but it can also use the newer DoH protocol.

Oilrig uses DNSExfiltrator to move data laterally across internal networks, and then exfiltrate it to an outside point. Criminals allegedly use DoH as a leakage channel to avoid detection or monitoring activity when stolen data is moved.

Back to the list

Latest Posts

Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany

Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany

The attacks targeted entities "related to Russia's war of aggression against Ukraine."
6 May 2024
Russian operator behind BTC-e crypto exchange pleads guilty to money laundering

Russian operator behind BTC-e crypto exchange pleads guilty to money laundering

Vinnik was one of the key operators of BTC-e, a primary facilitator for cybercriminals.
6 May 2024
Cyber Security Week in Review: May 3, 2024

Cyber Security Week in Review: May 3, 2024

In brief: the Dropbox breach, Chinese hackers caught manipulating China’s Great Firewall, REvil hacker sentenced, and moreю
3 May 2024