Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Haj Hawk Gang exploits DNS Missconfigs to hijack reliable domain
    Security

    Haj Hawk Gang exploits DNS Missconfigs to hijack reliable domain

    PineapplesUpdateBy PineapplesUpdateMay 20, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Haj Hawk Gang exploits DNS Missconfigs to hijack reliable domain
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Haj Hawk Gang exploits DNS Missconfigs to hijack reliable domain

    A danger actor has been tracked as ‘Hausi Hawk’, which has been abandoned cloud services, leaving cloud services, which has been left to distribute scams, fake apps and malicious advertisements about reliable sub -domains of governments, universities and fate 500 companies.

    As Infoblox researcherThe Hagy Hawk CNAME scans first to the domain with a record, which is left out of cloud andpoints, which they determine through passive DNS data verification.

    Subsequently, they register a new cloud resource with the same name that occurs as one in the abandoned CNAME, inspiring the subdoman of the original domain to solve the new cloud-host site of the actor with danger.

    Using this technique, the danger actors kidnapped several domains to host malicious activities, host scam content, or used them as a redirect hub to operate the scam.

    Some notable examples of the kidnapped domain include:

    • Cdc.gov – U.S. Centers for Disease Control and Prevention
    • honeywell.com – multinational conglomerate
    • Burkeley. Du – University of California, Berkeley
    • Michelin.co.uk – Michelin Tire UK
    • Ey.com, pwc.com, deloitte.com – Global “Big Four” consulting firm
    • ted.com – Famous non -profit media organization (TED talks)
    • health.gov.au – Australian Health Department
    • Unicef.org – Funds of United Nations Children
    • nyu.edu – New York University
    • Unilever.com – Global Consumer Goods Company
    • ca.gov – California State Government

    The complete list of compromised domains can be seen in the Infoblox report.

    Once the actor receives control over a subdomain, they produce hundreds of malicious URLs below it, which appear valid in the search engine due to the high trust score of the original domain.

    The victims clicking on the URL are redirected through layers of domains and TDS infrastructure that profile them to qualify the victims based on their devices, IP addresses, VPN uses, etc.

    Overview of Housi Hawk Attack
    Overview of Housi Hawk Attack
    Source: Infoblox

    Infoblox reports stated that sites are used for tech support scams, fake antivirus alerts, fake streaming/porn sites and fishing pages.

    Users cheated to allow browser push notifications, as they continuously receive alerts even after leaving scam sites, which can generate significant revenue for Hawk Hawk.

    Example examples notification from campaign
    Example examples notification from campaign
    Source: Infoblox

    The same researchers earlier explained another danger actor, ‘Savi Sehors’, who also misused CNAME records, which was done to build an etipical TDS, who re -resurrected users to fake investment platforms.

    CNAME records are easy to ignore, so they are prone to misbehaving secretly, and it appears that the increasing number of danger in danger makes actors realize it and attempts to take advantage.

    In the case of Hausi Hawk, the success of the operation also depends on organizations that fail to remove the DNS record after decreasing cloud services, which allows the attackers to repeat the original resource name without authentication.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    DNS domain exploits gang Haj Hawk hijack Missconfigs reliable
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNeed to entertain your children? These 8 Netflix shows are correct
    Next Article Premier League Soccer: Stream Man City vs Bornmouth lives from anywhere
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How to Find and Remove PC Viruses for Free: 12 Reliable Ways That Worked for Me

    November 12, 2025
    Startups

    I found a smartwatch that’s just as reliable as my Garmin (but much cheaper)

    October 26, 2025
    Security

    Your Uber driver has a new endeavor: training an AI for cash

    October 18, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.