Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      Dogecoin (DOGE) Struggles to Break Out—Can Rising Indicators Shift the Trend?

      June 15, 2025

      Amazon and Walmart are Preparing to Launch Stablecoins

      June 15, 2025

      Why XRP Keeps Falling Despite Bullish Headlines from Ripple

      June 15, 2025

      FTX Sends Fresh $10 Million in Solana to 30 wallets

      June 15, 2025

      This Week’s Largest Altcoin Gainers: How Far Will These Tokens Go?

      June 15, 2025
    • Technology

      As grocery shortages persist, UNFI says it’s recovering from cyberattack

      June 16, 2025

      The investor experience at TechCrunch All Stage: One floor, infinite deal flow

      June 16, 2025

      Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

      June 16, 2025

      The founder experience at TechCrunch All Stage: Built for people building what’s next

      June 16, 2025

      What makes TechCrunch All Stage different from other startup events? Answers to your most pressing questions

      June 16, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
    Technology

    Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe

    TechAiVerseBy TechAiVerseJune 1, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe

    Image Credit: Pixabay
    (Image credit: Pixabay)

    • Outdated DNS records create invisible openings for criminals to spread malware through legitimate sites
    • Hazy Hawk turns misconfigured cloud links into silent redirection traps for fraud and infection
    • Victims think they’re visiting a real site, until popups and malware take over

    A troubling new online threat is emerging in which criminals hijack subdomains of major organizations, such as Bose, Panasonic, and even the US CDC (Centers for Disease Control and Prevention), to spread malware and perpetrate online scams.

    As flagged by security experts Infoblox, at the center of this campaign is a threat group known as Hazy Hawk, which has taken a relatively quiet but highly effective approach to compromise user trust and weaponize it against unsuspecting visitors.

    These subdomain hijackings are not the result of direct hacking but rather of exploiting overlooked infrastructure vulnerabilities.

    An exploit rooted in administrative oversight

    Instead of breaching networks through brute force or phishing, Hazy Hawk exploits abandoned cloud resources linked to misconfigured DNS CNAME records.

    These so-called “dangling” records occur when an organization decommissions a cloud service but forgets to update or delete the DNS entry pointing to it, leaving the subdomain vulnerable.

    For example, a forgotten subdomain like something.bose.com might still point to an unused Azure or AWS resource, and if Hazy Hawk registers the corresponding cloud instance, the attacker suddenly controls a legitimate-looking Bose subdomain.

    This method is dangerous because misconfigurations are not typically flagged by conventional security systems.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The repurposed subdomains become platforms for delivering scams, including fake antivirus warnings, tech support cons, and malware disguised as software updates.

    Hazy Hawk doesn’t just stop at hijacking – the group uses traffic distribution systems (TDSs) to reroute users from hijacked subdomains to malicious destinations.

    These TDSs, such as viralclipnow.xyz, assess a user’s device type, location, and browsing behavior to serve up tailored scams.

    Often, redirection begins with seemingly innocuous developer or blog domains, like share.js.org, before shuffling users through a web of deception.

    Once users accept push notifications, they continue to receive scam messages long after the initial infection, establishing a lasting vector for fraud.

    The fallout from these campaigns is more than theoretical and has affected high-profile organizations and firms like the CDC, Panasonic and Deloitte.

    Individuals can guard against these threats by refusing push notification requests from unfamiliar sites and exercising caution with links that seem too good to be true.

    For organizations, the emphasis must be on DNS hygiene. Failing to remove DNS entries for decommissioned cloud services leaves subdomains vulnerable to takeover.

    Automated DNS monitoring tools, especially those integrated with threat intelligence, can help detect signs of compromise.

    Security teams should treat these misconfigurations as critical vulnerabilities, not minor oversights.

    You might also like

    • These are the best AI website builders around
    • UK businesses say that fear of missing out is driving AI adoption
    • TikTok fans beware – experts warn dangerous malware spread by AI fake videos

    Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master’s and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleEverything new on Paramount+ in June 2025 – including over 80 new movies to add to your watchlist
    Next Article Netflix Tudum 2025: every announcement from Stranger Things, One Piece, Squid Game, Wednesday and more
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    June 16, 2025

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    June 16, 2025

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    June 16, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202525 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202519 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 16, 2025

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    As grocery shortages persist, UNFI says it’s recovering from cyberattack Image Credits:TechCrunch 8:15 AM PDT…

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    The founder experience at TechCrunch All Stage: Built for people building what’s next

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    June 16, 20250 Views

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    June 16, 20250 Views

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    June 16, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.