Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tried GPTGirlfriend So You Don’t Have To: My Trustworthy Overview

    July 30, 2025

    New Choicejacking Assault Steals Knowledge from Telephones through Public Chargers

    July 30, 2025

    Nvidia chips: Trump handed China a serious benefit on AI

    July 30, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Hazy Hawk Assault Noticed Concentrating on Deserted Cloud Property Since 2023
    AI Ethics & Regulation

    Hazy Hawk Assault Noticed Concentrating on Deserted Cloud Property Since 2023

    Declan MurphyBy Declan MurphyMay 20, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hazy Hawk Assault Noticed Concentrating on Deserted Cloud Property Since 2023
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Infoblox reveals Hazy Hawk, a brand new menace exploiting deserted cloud sources (S3, Azure) and DNS gaps since Dec 2023. Study their techniques and the right way to shield your group and customers.

    Cybersecurity researchers at Infoblox Menace Intelligence have launched important findings on a lately recognized menace, dubbed Hazy Hawk, which has been actively hijacking forgotten cloud sources since a minimum of December 2023.

    In its report, shared completely with Hackread.com. researchers famous that this superior group is known for its DNS-savvy techniques and exploits gaps in Area Title System (DNS) data to redirect unsuspecting web customers to fraudulent web sites and malware.

    This revelation comes because the Federal Commerce Fee (FTC) reviews a major 25% enhance in scam-related losses from 2023, totalling a whopping $12.5 billion.

    The Assault

    Infoblox first detected Hazy Hawk’s actions in February 2025, when the group efficiently took management of subdomains belonging to the US Facilities for Illness Management (CDC). Cybersecurity journalist Brian Krebs was the primary to discover suspicious exercise on the CDC’s area.

    Additional investigation revealed that international authorities businesses, together with alabama.gov and well being.gov.au, main universities like berkeley.edu and ucl.ac.uk, and worldwide corporations together with Deloitte.com and PwC.com, have additionally been focused.

    Hazy Hawk’s methodology entails discovering dangling DNS data, that are CNAME data pointing to deserted cloud sources like Amazon S3 buckets, Azure endpoints, Akamai, Cloudflare CDN, and GitHub. They register these sources, acquire management, and use them to host quite a few malicious URLs. Infoblox dubbed the group Hazy Hawk because of their uncommon strategies of finding and hijacking particular cloud sources.

    How Victims Are Lured and Defenses Evaded

    Hazy Hawk employs numerous techniques to deceive victims, together with pretend browser notifications and fraudulent functions, utilizing URL obfuscation to cover hyperlink locations, and repurposing code from reliable web sites to make their preliminary pages seem reliable. In addition they alter AWS S3 bucket URLs or redirect to the College of Bristol’s web site.

    As soon as a consumer clicks on a malicious hyperlink, they’re routed via a number of redirection websites like Blogspot or hyperlink shorteners like TinyURL, Bitly and visitors distribution techniques (TDSs) earlier than reaching viralclipnow.xyz.

    Assault Sequence (Supply: Infoblox)

    These techniques are designed to maximise scammers’ earnings and make it tough for safety specialists to hint assaults by dynamically altering content material, main victims to scams like tech assist fraud or reward card schemes.

    The analysis reveals that push notifications are a key element of scams, the place the menace actor can obtain a 70-90 p.c income share from the affiliate who obtained the sufferer’s approval, with providers like RollerAds, enabling repeated sufferer focusing on.

    To stop such hijackings, organizations ought to use well-managed DNS, together with eradicating DNS CNAME data when cloud sources are retired. Finish-users can shield themselves via protecting DNS options that block entry to malicious domains, even when menace actors change web site names, and watch out about web site notification requests



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    New Choicejacking Assault Steals Knowledge from Telephones through Public Chargers

    July 30, 2025

    Wiz Uncovers Vital Entry Bypass Flaw in AI-Powered Vibe Coding Platform Base44

    July 30, 2025

    Android Banking Malware Masquerades as Authorities Companies to Assault Customers

    July 29, 2025
    Top Posts

    Tried GPTGirlfriend So You Don’t Have To: My Trustworthy Overview

    July 30, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Tried GPTGirlfriend So You Don’t Have To: My Trustworthy Overview

    By Amelia Harper JonesJuly 30, 2025

    You click on on Tickeron considering, “AI buying and selling bot—sounds futuristic,” and then you…

    New Choicejacking Assault Steals Knowledge from Telephones through Public Chargers

    July 30, 2025

    Nvidia chips: Trump handed China a serious benefit on AI

    July 30, 2025

    Mistral-Small-3.2-24B-Instruct-2506 is now accessible on Amazon Bedrock Market and Amazon SageMaker JumpStart

    July 30, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.