Cybercriminals are increasingly exploiting the Domain Name System (DNS) to smuggle malware undetected into networks by hiding malicious payloads inside DNS TXT records, researchers have warned. This emerging attack vector represents a potent blind spot because security tools often overlook legitimate-looking DNS traffic.
A report from Infoblox, detailed by Ars Technica, highlights how attackers are encoding malicious shellcode into base64 strings stored in DNS records. Once queried, compromised endpoints reconstruct and execute the hidden payloads, effectively sidestepping many perimeter defenses and inspection tools that typically scrutinize only web or email traffic .
“This method allows attackers to tunnel data and command-and-control communications while masquerading as regular DNS requests and responses,” said Renée Burton, head of threat intelligence at Infoblox. “Traditional security solutions rarely monitor or block this kind of traffic because DNS is essential to network operations.”
How the Attack Works
-
TXT Records as Data Carriers: TXT records, designed for miscellaneous text data like SPF and DKIM configurations, can store arbitrary strings—including encoded malware payloads.
-
Evasion of Security Tools: Many intrusion detection systems do not analyze DNS payloads for embedded shellcode, allowing attackers to avoid detection.
-
Low Suspicion Activity: DNS traffic is so routine that it seldom triggers alarms, giving attackers cover for stealthy data exfiltration or remote code execution.
Infoblox observed active malware campaigns leveraging this approach, with attack chains often culminating in Cobalt Strike beacons or other remote access tools .
🚦 Why This Matters
-
Detection Difficulty: Even sophisticated security appliances may bypass DNS lookups to avoid disrupting network services.
-
Nation-State Interest: The technique is attractive for espionage operations seeking persistent, covert access to sensitive environments.
-
Need for Visibility: Security experts recommend deeper DNS inspection and behavioral analysis to detect anomalies such as unusually large TXT records.
“This is another reminder that attackers are innovating faster than defenders,” Burton said. “DNS should be treated as a monitored and protected channel—not a blind spot.”
Defensive Measures
-
Implement DNS filtering and inspection tools capable of parsing and analyzing TXT record contents.
-
Establish baselines for normal DNS traffic to detect anomalies.
-
Block suspicious or unusually large TXT records, especially from unfamiliar domains.
-
Deploy security solutions with threat intelligence feeds that can recognize known malicious domains exploiting DNS tunnels.

