InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Strela Stealer running detour dog running through a DNS-powered malware factory
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Strela Stealer running detour dog running through a DNS-powered malware factory
Technology

Strela Stealer running detour dog running through a DNS-powered malware factory

October 3, 2025 8 Min Read
Share
Strela Stealer running detour dog running through a DNS-powered malware factory
SHARE

Name threat actor Detour dog It’s been a no-go campaign for the power to distribute information stolen goods known as Strela Stealers.

This is according to Infoblox’s finding threat actors to maintain control over the domain hosting a backdoor called Staterfish, the first stage in Stealer.

DNS threat intelligence company said it was tracking detour dogs in August 2023. Sucuri, owned by Godaddy, disclosed details of the attack targeting WordPress sites, embed malicious JavaScript using DNS TXT records as a communication channel for the Traffic Delivery System (TDS), redirecting site visitors to Sackey sites and malWarw. The traces of the threatening actor date back to February 2020.

“Traditionally these redirects have led to scams, but malware has recently evolved and has run remote content via DNS-based command and control (C2) systems,” Infoblox said. “We are tracking threat actors who control this malware as a bypass dog.”

According to the company, the infrastructure owned by detour dogs is used to host human rafish, a simple reverse shell that acts as a conduit for the strel laurel. In a report published in July 2025, IBM X-Force said that backdoors will be delivered by malicious SVG files with the aim of allowing permanent access to infected machines.

Since at least 2022, HIVE0145, a threat actor only behind the Strela Stealer campaign, has been rated financially motivated, operating as an early access broker (IAB), gaining access to compromised systems and selling them.

An analysis of Infoblox revealed that at least 69% of confirmed starfish staging hosts are under the control of detour dogs, and that Mikrotik Botnet, advertised as Lem Proxy, is driven by SystemBC, as revealed by Lumen’s Black Lotus Labs.

Specifically, it has been revealed that spam email messages distributed across Strela Stealer originated from another botnet called Rem Proxy and Tofsee, the latter being propagated in the past via a C++-based loader called Privateloader. In both cases, detour dog infrastructure hosted the first phase of the attack.

See also  Researchers reveal SVG and Purerat phishing threats targeting Ukraine and Vietnam

“The botnet was signed to deliver spam messages, and the detour dogs were signed to deliver malware,” Dr Renée Burton, vice president of threat intelligence at Infoblox, told Hacker News.

Additionally, detour dogs to promote the distribution of steelers via DNS TXT records have been modified so that threat and controlled DNS name servers parse specially formatted DNS queries from compromised sites and respond with remote code execution commands.

When it comes to getting new infrastructure, the detour dog’s trick is to leverage vulnerable WordPress sites to perform malicious code injections, but the company says the way it does is continuing to evolve.

A notable aspect of the attack is that the compromised websites usually function 90% of the time, thus not raising a red flag and allowing the malware to last for a long time. However, in the selected instance (approximately 9%), site visitors will be redirected to scam via Help TDS or Manager TDS. In a much rarer scenario (1%), the site receives a remote file execution command. It is believed that redirects are restricted in bids to avoid detection.

This development is only marked when detour dogs are discovered to distribute malware. This is a transition from acting as an entity solely responsible for traffic to Los Pollos, a malicious ad technology company operating under Vextrio Viper Umbrella.

“We think it evolved from fraud to include the distribution of malware for financial reasons,” Burton said. “There’s been a big focus in the security industry over the past 12-18 months to stop the types of scams that dogs have supported in the past. We can’t confirm that, but I believe they’ve made less money.”

See also  Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

Complementing these changes is the fact that the malware on the websites used by Detour Dog has witnessed its own evolution and gained the ability to command infected websites to execute code from remote servers.

As of June 2025, the response could instruct infected sites to retrieve PHP script output from a validated Strela Stealer C2 server, potentially dispersing malware.

“The response to the TXT record query is Base64 encoded and explicitly includes the word ‘Down’ to trigger this new action,” the company says. “We believe that we created a new network malware distribution model using DNS where different stages are fetched from different hosts under threat actor control and users are relayed back when they interact with campaign temptations, e.g. email attachments.

“This new setup allows attackers to hide their identity behind the compromised website, making the operation more resilient, and during that time it can help mislead threat hunters as malware is not where the attachments analyzed are shown to be hosted.”

The entire series of actions unfolds as follows:

  • Victims open malicious documents and launch SVG files that reach for the infected domain
  • A compromised site sends TXT record requests via DNS to the Dog C2 server
  • The name server responds with a TXT record containing a Strela C2 URL marked “down”.
  • A compromised site may remove down prefix and use curls to get starfish downloader from the URL
  • A compromised site acts as a relay for sending downloaders to clients (i.e. victims)
  • The downloader will initiate a call to another compromised domain
  • The second compromised domain sends a similar DNS TXT query to the Detour Dog C2 server
  • The Detour Dog Name Server responds with a new Strela C2 URL and is again marked with “Down”
  • The second compromised domain strips the prefix and sends a curl request to the Strera C2 server to get the starfish
  • The second compromised domain acts as a relay for sending malware to the client (i.e., victim)
See also  Europol dismantles SIM farm network running 49 million fake accounts worldwide

Infoblox said on July 30th and August 6th, 2025, it collaborated with the Shadowserver Foundation to sink two of the two Detour Dog C2 domains (Webdmonitor (.)IO and Aeroarrows (.)IO).

The company also noted that threat actors are likely to act as distribution as a service (DAAS) provider, adding that evidence of “clearly unrelated files” propagated through the infrastructure has been found. However, he pointed out that “we were unable to verify what was delivered.”

Share This Article
Twitter Copy Link
Previous Article Thank you, Warhammer 40K Mechanicus 2, your Steam demo filmed me Thank you, Warhammer 40K Mechanicus 2, your Steam demo filmed me
Next Article The White House says California uses "loopholes" to give undocumented Medicaid for immigrants. Experts disagree The White House says California uses “loopholes” to give undocumented Medicaid for immigrants. Experts disagree

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack
Technology

New Coldriver Malware Campaign joins BO Team and Bearlyfy in a Russian-focused cyberattack

6 Min Read
New bug in Oracle E-Business Suite could allow hackers to access data without logging in
Technology

New bug in Oracle E-Business Suite could allow hackers to access data without logging in

2 Min Read
Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies
Technology

Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies

7 Min Read
UNC1549 Hacking 34 devices from 11 telecom companies via LinkedIn Job Lures and Minibike malware
Technology

UNC1549 Hacking 34 devices from 11 telecom companies via LinkedIn Job Lures and Minibike malware

8 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?