Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»StormBamboo’s DNS Poisoning Attack Targets Software Updates

    StormBamboo’s DNS Poisoning Attack Targets Software Updates

    August 4, 2024

    A sophisticated hacking group by the name of StormBamboo has successfully compromised an internet service provider (ISP) to launch a DNS poisoning attack, targeting organizations through insecure software update mechanisms. This attack, detected by security researchers in mid-2023, exploits vulnerabilities in automatic update processes to install malware on both macOS and Windows systems.

    StormBamboo DNS Poisoning Attack Vector

    StormBamboo’s method involves altering DNS query responses for specific domains tied to automatic software updates. By targeting applications that use insecure update mechanisms, such as HTTP, and don’t properly validate digital signatures, the group redirects update requests to their own servers. This results in the installation of malware instead of legitimate updates.

    Source: https://www.volexity.com

    Cybersecurity firm Volexity confirmed that the DNS poisoning occurred at the ISP level, not within the target organization’s infrastructure.

    The poisoned DNS records resolved to an attacker-controlled server in Hong Kong. When the ISP finally investigated and took various network components offline, the DNS poisoning immediately stopped.

    This attack bears similarities to a previous incident attributed to DriftingBamboo, another threat actor possibly related to StormBamboo. Both groups have used DNS poisoning to facilitate initial access to target networks.

    Malware Deployment and Post-Exploitation Activity

    StormBamboo deployed several malware families, including new variants of MACMA for macOS and POCOSTICK (also known as MGBot) for Windows. The latest version of MACMA shows significant code similarities to the GIMMICK malware family, suggesting a convergence in their development.

    In one case, following the compromise of a macOS device, StormBamboo deployed a malicious Google Chrome extension called RELOADEXT. This extension, disguised as a tool for loading pages in Internet Explorer compatibility mode, actually exfiltrates browser cookies to an attacker-controlled Google Drive account.

    The extension also contained obfuscated JavaScript code that was used to exfiltrate data to the attacker’s Google Drive account. The data was encrypted using AES with the key opizmxn!@309asdf and encoded with base64 prior to exfiltration.

    This incident highlights the vulnerability of software that relies on insecure update mechanisms. It also demonstrates the sophisticated tactics employed by threat actors like StormBamboo, who can compromise third-party infrastructure to reach their intended targets.

    To protect against attacks similar to StormBamboo, organizations should:

    Implement and enforce the use of HTTPS for all software update processes.
    Regularly audit and update network infrastructure, especially DNS-related components.
    Use robust digital signature verification for all software updates.
    Monitor for unusual DNS activity and unexplained changes in DNS responses.
    Employ network security monitoring tools capable of detecting DNS poisoning attempts.

    The variety of malware employed in various campaigns by this threat actor indicates significant effort is invested in actively supported payloads for not only macOS and Windows, but also network appliances.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePanamorfi Campaign Leverages Minecraft DDoS Package Deployed Via Jupyter Notebook and Discord
    Next Article Unveiling the SLUBStick Cross-Cache Attack on the Linux Kernel

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Infortrend NAS CS4000U Storage Cost and Price in India – Affordable and Reliable

    Web Development

    Are Locals Finding You? How to Optimize for Local SEO

    Development

    The Virtual Lab: AI Agents Design New SARS-CoV-2 Nanobodies with Experimental Validation

    Development

    CVE-2025-4265 – PHPGurukul Emergency Ambulance Hiring Portal SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Linux

    L’adozione DevSecOps sale (per via dei tool) ma la formazione degli sviluppatori no. Stiamo sbagliando qualcosa…

    January 21, 2025

    La notizia che raccontiamo oggi tratta un tema a me caro, anzi carissimo, e si…

    Build generative AI–powered Salesforce applications with Amazon Bedrock

    July 29, 2024

    These wireless speakers deliver gloriously smooth sound for any style of music – and they’re $200 off

    March 21, 2025

    We need a Snapdragon X-powered gaming handheld sooner rather than later — How Qualcomm can challenge the Steam Deck

    February 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.