Category: DNS Forensics

Tracking Short Lived Domains Used in QR Phishing

QR phishing, or “quishing,” has rapidly emerged as a major threat vector, leveraging the widespread adoption of QR codes to trick users into visiting malicious domains. Attackers embed QR codes in emails, printed materials, or even public advertisements, enticing users to scan them with mobile devices that often bypass traditional email security filters. A critical…

continue reading
No Comments

Detecting Multi Stage Malware Using DNS Pivoting

DNS pivoting is a sophisticated technique employed both by attackers and defenders. In the context of multi-stage malware detection, it refers to the method of tracing the relationships and transitions between domain names used across different stages of an attack campaign. Multi-stage malware typically unfolds through several distinct phases, including initial infection, command-and-control (C2) establishment,…

continue reading
No Comments

Investigating DNS Hijacking of Cryptocurrency Platforms

DNS hijacking attacks targeting cryptocurrency platforms have become a highly lucrative and dangerous vector for cybercriminals. These attacks manipulate the DNS resolution process to redirect users attempting to access legitimate crypto services to attacker-controlled infrastructures. The impact of such hijacking can be devastating, often resulting in the theft of digital assets, compromise of user credentials,…

continue reading
No Comments

Correlation Techniques for DNS and NetFlow Data

In the field of network forensics, correlating DNS and NetFlow data has become an essential strategy for identifying malicious activities, reconstructing attacker behavior, and achieving high-fidelity threat detection. DNS data provides insight into the names and destinations that devices on a network are attempting to reach, while NetFlow data captures metadata about the actual connections…

continue reading
No Comments

Forensic Readiness Designing DNS Logging Architectures

Forensic readiness in the realm of DNS forensics demands a deliberate and robust approach to logging architectures that not only capture comprehensive DNS data but also ensure its integrity, accessibility, and usability during incident response and investigations. The importance of DNS logging cannot be overstated, as DNS often serves as the first point of contact…

continue reading
No Comments