Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Hazy Hawk Assault Noticed Concentrating on Deserted Cloud Property Since 2023
    AI Ethics & Regulation

    Hazy Hawk Assault Noticed Concentrating on Deserted Cloud Property Since 2023

    Declan MurphyBy Declan MurphyMay 20, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hazy Hawk Assault Noticed Concentrating on Deserted Cloud Property Since 2023
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Infoblox reveals Hazy Hawk, a brand new menace exploiting deserted cloud sources (S3, Azure) and DNS gaps since Dec 2023. Study their techniques and the right way to shield your group and customers.

    Cybersecurity researchers at Infoblox Menace Intelligence have launched important findings on a lately recognized menace, dubbed Hazy Hawk, which has been actively hijacking forgotten cloud sources since a minimum of December 2023.

    In its report, shared completely with Hackread.com. researchers famous that this superior group is known for its DNS-savvy techniques and exploits gaps in Area Title System (DNS) data to redirect unsuspecting web customers to fraudulent web sites and malware.

    This revelation comes because the Federal Commerce Fee (FTC) reviews a major 25% enhance in scam-related losses from 2023, totalling a whopping $12.5 billion.

    The Assault

    Infoblox first detected Hazy Hawk’s actions in February 2025, when the group efficiently took management of subdomains belonging to the US Facilities for Illness Management (CDC). Cybersecurity journalist Brian Krebs was the primary to discover suspicious exercise on the CDC’s area.

    Additional investigation revealed that international authorities businesses, together with alabama.gov and well being.gov.au, main universities like berkeley.edu and ucl.ac.uk, and worldwide corporations together with Deloitte.com and PwC.com, have additionally been focused.

    Hazy Hawk’s methodology entails discovering dangling DNS data, that are CNAME data pointing to deserted cloud sources like Amazon S3 buckets, Azure endpoints, Akamai, Cloudflare CDN, and GitHub. They register these sources, acquire management, and use them to host quite a few malicious URLs. Infoblox dubbed the group Hazy Hawk because of their uncommon strategies of finding and hijacking particular cloud sources.

    How Victims Are Lured and Defenses Evaded

    Hazy Hawk employs numerous techniques to deceive victims, together with pretend browser notifications and fraudulent functions, utilizing URL obfuscation to cover hyperlink locations, and repurposing code from reliable web sites to make their preliminary pages seem reliable. In addition they alter AWS S3 bucket URLs or redirect to the College of Bristol’s web site.

    As soon as a consumer clicks on a malicious hyperlink, they’re routed via a number of redirection websites like Blogspot or hyperlink shorteners like TinyURL, Bitly and visitors distribution techniques (TDSs) earlier than reaching viralclipnow.xyz.

    Assault Sequence (Supply: Infoblox)

    These techniques are designed to maximise scammers’ earnings and make it tough for safety specialists to hint assaults by dynamically altering content material, main victims to scams like tech assist fraud or reward card schemes.

    The analysis reveals that push notifications are a key element of scams, the place the menace actor can obtain a 70-90 p.c income share from the affiliate who obtained the sufferer’s approval, with providers like RollerAds, enabling repeated sufferer focusing on.

    To stop such hijackings, organizations ought to use well-managed DNS, together with eradicating DNS CNAME data when cloud sources are retired. Finish-users can shield themselves via protecting DNS options that block entry to malicious domains, even when menace actors change web site names, and watch out about web site notification requests



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    January 26, 2026

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Konni Hackers Deploy AI-Generated PowerShell Backdoor Towards Blockchain Builders

    By Declan MurphyJanuary 26, 2026

    Ravie LakshmananJan 26, 2026Malware / Endpoint Safety The North Korean menace actor often called Konni…

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026

    Hadrian raises funding for automated manufacturing, bringing valuation to $1.6B

    January 26, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.