Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    Windows throttled my 4K webcam

    Send a letter to your future self with FutureMe

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Could this be the key to eternal storage? Experts claim new DNA HDD can be ‘erased and overwritten repeatedly’

      March 9, 2026

      Need more storage? Get a lifetime of 10TB cloud space for just $270.

      March 8, 2026

      Google PM open-sources Always On Memory Agent, ditching vector databases for LLM-driven persistent memory

      March 8, 2026

      Regulate AWS and Microsoft, says UK cloud provider survey

      March 8, 2026

      Google releases Gemini 3.1 Flash Lite at 1/8th the cost of Pro

      March 4, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Save 30% on Ugreen’s fast USB-C charger with retractable cable

      March 9, 2026

      Windows throttled my 4K webcam

      March 9, 2026

      Send a letter to your future self with FutureMe

      March 9, 2026

      Hackers know your social security number. Here’s how to stay safe

      March 9, 2026

      Acer Swift X 14 AI review: Fast, creator-focused OLED laptop

      March 9, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
    Technology

    Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains

    TechAiVerseBy TechAiVerseMay 20, 2025No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains

    A threat actor tracked as ‘Hazy Hawk’ is hijacking forgotten DNS CNAME records pointing to abandoned cloud services, taking over trusted subdomains of governments, universities, and Fortune 500 companies to distribute scams, fake apps, and malicious ads.

    According to Infoblox researchers, Hazy Hawk first scans for domains with CNAME records pointing to abandoned cloud endpoints, which they determine via passive DNS data validation.

    Next, they register a new cloud resource with the same name as the one in the abandoned CNAME, causing the original domain’s subdomain to resolve to the threat actor’s new cloud-hosted site.

    Using this technique, the threat actors hijacked multiple domains to cloak malicious activities, host scam content, or use them as redirection hubs for scam operations.

    Some notable examples of the hijacked domains include:

    • cdc.gov – U.S. Centers for Disease Control and Prevention
    • honeywell.com – Multinational conglomerate
    • berkeley.edu – University of California, Berkeley
    • michelin.co.uk – Michelin Tires UK
    • ey.com, pwc.com, deloitte.com – Global “Big Four” consulting firms
    • ted.com – Famous nonprofit media organization (TED Talks)
    • health.gov.au – Australian Department of Health
    • unicef.org – United Nations Children’s Fund
    • nyu.edu – New York University
    • unilever.com – Global Consumer Goods Company
    • ca.gov – California State Government

    The complete list of compromised domains can be found in the Infoblox report.

    Once the threat actor gains control of a subdomain, they generate hundreds of malicious URLs under it, which appear legitimate in search engines due to the parent domain’s high trust score.

    Victims clicking on the URLs are redirected through layers of domains and TDS infrastructure that profile them based on their device type, IP address, VPN use, etc., to qualify victims.

    Overview of the Hazy Hawk attack
    Source: Infoblox

    Infoblox’s report says the sites are used for tech support scams, bogus antivirus alerts, fake streaming/porn sites, and phishing pages.

    Users tricked into allowing browser push notifications get persistent alerts even after they leave the scam sites, which can generate significant revenue for Hazy Hawk.

    Push notification examples from the campaign
    Source: Infoblox

    The same researchers reported previously about another threat actor, ‘Savvy Seahorse,’ who also abused CNAME records to build an atypical TDS that redirected users to fake investment platforms.

    It’s easy to overlook CNAME records, so they are prone to stealthy abuse, and it appears that an increasing number of threat actors realize this and attempt to take advantage.

    In the case of Hazy Hawk, the operation’s success also relies on organizations failing to delete DNS records after cloud services are decommissioned, which permits attackers to replicate the original resource name without authentication.


    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleRVTools hit in supply chain attack to deliver Bumblebee malware
    Next Article Everything you need to know about estimating AI’s energy and emissions burden
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    March 9, 2026

    Windows throttled my 4K webcam

    March 9, 2026

    Send a letter to your future self with FutureMe

    March 9, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025707 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025297 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025166 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025130 Views
    Don't Miss
    Technology March 9, 2026

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    Save 30% on Ugreen’s fast USB-C charger with retractable cable Image: Ugreen Everyone could use…

    Windows throttled my 4K webcam

    Send a letter to your future self with FutureMe

    Hackers know your social security number. Here’s how to stay safe

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Save 30% on Ugreen’s fast USB-C charger with retractable cable

    March 9, 20262 Views

    Windows throttled my 4K webcam

    March 9, 20262 Views

    Send a letter to your future self with FutureMe

    March 9, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.