Compromised Routers, DNS, and a TDS Hidden in Aeza Networks
A shadow DNS network and HTTP-based traffic distribution system (TDS) hosted in Aeza International, a sanctioned bulletproof hosting company, has been discovered. The system compromises routers, altering their DNS settings to use shadow resolvers. These resolvers selectively modify responses, directing users to malicious content. The TDS incorporates a clever DNS trick to evade detection by security groups. The system, operational since mid-2022, appears to be run by a financially motivated actor in affiliate marketing. It has the potential to interfere with devices on the network, alter DNS records, and conduct adversary-in-the-middle operations. The threat actor's ability to control DNS resolution poses significant risks beyond delivering unwanted advertising.
AI Analysis
Technical Summary
This threat involves a shadow DNS network combined with an HTTP-based traffic distribution system (TDS) hosted within Aeza International, a bulletproof hosting provider under sanctions. The attackers compromise routers by changing their DNS settings to point to shadow DNS resolvers controlled by the adversary. These resolvers selectively alter DNS responses, redirecting users to malicious or unwanted content, primarily for affiliate marketing revenue. The TDS uses advanced DNS manipulation techniques to evade detection by security tools, including clever DNS tricks that obscure malicious activity. Since mid-2022, this system has been operational, targeting network devices by hijacking DNS resolution paths. The compromised routers become a vector for adversary-in-the-middle (MitM) attacks, allowing interception and manipulation of network traffic beyond simple ad injection. The threat actor’s control over DNS resolution can undermine confidentiality and integrity of communications, potentially enabling further exploitation or data exfiltration. Indicators of compromise include specific IP addresses (e.g., 89.208.107.49, 104.238.29.136) and domains (e.g., gettranslate.ir, jackpotshop.life). Although no CVE or known exploits are currently reported, the threat’s persistence and stealthy nature make it a medium-severity concern. The use of a sanctioned bulletproof host complicates takedown efforts and attribution. The campaign’s focus on affiliate marketing suggests financial motivation but does not preclude escalation to more damaging activities.
Potential Impact
For European organizations, the compromise of routers and DNS infrastructure can lead to significant risks including interception of sensitive data, redirection to phishing or malware sites, and disruption of normal network operations. The ability to manipulate DNS responses undermines trust in network communications and can facilitate further attacks such as credential theft, malware deployment, or lateral movement within corporate networks. Organizations with large numbers of remote or home office users relying on consumer-grade routers are particularly vulnerable. The threat could degrade availability by redirecting or blocking legitimate services, impacting business continuity. Additionally, the use of a bulletproof hosting provider complicates mitigation and attribution efforts, potentially prolonging exposure. Financially motivated actors may escalate tactics, increasing the risk of fraud or data compromise. The medium severity rating reflects the threat’s potential to impact confidentiality, integrity, and availability, especially if combined with other attack vectors.
Mitigation Recommendations
1. Conduct comprehensive audits of all network routers, especially consumer and SMB devices, to verify DNS settings have not been altered. 2. Enforce strong authentication and firmware updates on routers to prevent unauthorized access and exploitation. 3. Implement DNS monitoring solutions to detect anomalous DNS queries and responses, focusing on shadow DNS resolvers and suspicious domains/IPs listed in threat intelligence feeds. 4. Block or restrict network traffic to and from known malicious IP addresses and domains associated with Aeza International infrastructure. 5. Use DNS security extensions (DNSSEC) where possible to validate DNS responses and reduce the risk of hijacking. 6. Educate users on risks of compromised DNS and encourage reporting of unusual network behavior. 7. Deploy network segmentation to limit exposure of critical systems to compromised devices. 8. Collaborate with ISPs and security communities to share intelligence and coordinate response efforts against bulletproof hosting abuse. 9. Regularly review and update incident response plans to include DNS hijacking scenarios. 10. Consider deploying DNS filtering services that can detect and block traffic to malicious destinations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
Indicators of Compromise
- ip: 89.208.107.49
- ip: 89.208.105.113
- hash: cef13d2e5a9d1e200a50a6b3834cc7a9
- hash: ded8deb7ff580788cc58cbbf5508f3bf
- ip: 104.238.29.136
- ip: 138.124.101.153
- ip: 147.45.69.3
- ip: 193.233.232.229
- ip: 45.80.228.233
- ip: 89.208.103.145
- url: http://gettranslate.ir:18443/baner?sig=ded8deb7ff580788cc58cbbf5508f3bf&BanerId=347333
- url: https://gettranslate.ir:18443
- domain: gettranslate.ir
- domain: jackpotshop.life
Compromised Routers, DNS, and a TDS Hidden in Aeza Networks
Description
A shadow DNS network and HTTP-based traffic distribution system (TDS) hosted in Aeza International, a sanctioned bulletproof hosting company, has been discovered. The system compromises routers, altering their DNS settings to use shadow resolvers. These resolvers selectively modify responses, directing users to malicious content. The TDS incorporates a clever DNS trick to evade detection by security groups. The system, operational since mid-2022, appears to be run by a financially motivated actor in affiliate marketing. It has the potential to interfere with devices on the network, alter DNS records, and conduct adversary-in-the-middle operations. The threat actor's ability to control DNS resolution poses significant risks beyond delivering unwanted advertising.
AI-Powered Analysis
Technical Analysis
This threat involves a shadow DNS network combined with an HTTP-based traffic distribution system (TDS) hosted within Aeza International, a bulletproof hosting provider under sanctions. The attackers compromise routers by changing their DNS settings to point to shadow DNS resolvers controlled by the adversary. These resolvers selectively alter DNS responses, redirecting users to malicious or unwanted content, primarily for affiliate marketing revenue. The TDS uses advanced DNS manipulation techniques to evade detection by security tools, including clever DNS tricks that obscure malicious activity. Since mid-2022, this system has been operational, targeting network devices by hijacking DNS resolution paths. The compromised routers become a vector for adversary-in-the-middle (MitM) attacks, allowing interception and manipulation of network traffic beyond simple ad injection. The threat actor’s control over DNS resolution can undermine confidentiality and integrity of communications, potentially enabling further exploitation or data exfiltration. Indicators of compromise include specific IP addresses (e.g., 89.208.107.49, 104.238.29.136) and domains (e.g., gettranslate.ir, jackpotshop.life). Although no CVE or known exploits are currently reported, the threat’s persistence and stealthy nature make it a medium-severity concern. The use of a sanctioned bulletproof host complicates takedown efforts and attribution. The campaign’s focus on affiliate marketing suggests financial motivation but does not preclude escalation to more damaging activities.
Potential Impact
For European organizations, the compromise of routers and DNS infrastructure can lead to significant risks including interception of sensitive data, redirection to phishing or malware sites, and disruption of normal network operations. The ability to manipulate DNS responses undermines trust in network communications and can facilitate further attacks such as credential theft, malware deployment, or lateral movement within corporate networks. Organizations with large numbers of remote or home office users relying on consumer-grade routers are particularly vulnerable. The threat could degrade availability by redirecting or blocking legitimate services, impacting business continuity. Additionally, the use of a bulletproof hosting provider complicates mitigation and attribution efforts, potentially prolonging exposure. Financially motivated actors may escalate tactics, increasing the risk of fraud or data compromise. The medium severity rating reflects the threat’s potential to impact confidentiality, integrity, and availability, especially if combined with other attack vectors.
Mitigation Recommendations
1. Conduct comprehensive audits of all network routers, especially consumer and SMB devices, to verify DNS settings have not been altered. 2. Enforce strong authentication and firmware updates on routers to prevent unauthorized access and exploitation. 3. Implement DNS monitoring solutions to detect anomalous DNS queries and responses, focusing on shadow DNS resolvers and suspicious domains/IPs listed in threat intelligence feeds. 4. Block or restrict network traffic to and from known malicious IP addresses and domains associated with Aeza International infrastructure. 5. Use DNS security extensions (DNSSEC) where possible to validate DNS responses and reduce the risk of hijacking. 6. Educate users on risks of compromised DNS and encourage reporting of unusual network behavior. 7. Deploy network segmentation to limit exposure of critical systems to compromised devices. 8. Collaborate with ISPs and security communities to share intelligence and coordinate response efforts against bulletproof hosting abuse. 9. Regularly review and update incident response plans to include DNS hijacking scenarios. 10. Consider deploying DNS filtering services that can detect and block traffic to malicious destinations.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.infoblox.com/blog/threat-intelligence/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks"]
- Adversary
- null
- Pulse Id
- 69836533452882efd5edaa55
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip89.208.107.49 | — | |
ip89.208.105.113 | — | |
ip104.238.29.136 | — | |
ip138.124.101.153 | — | |
ip147.45.69.3 | — | |
ip193.233.232.229 | — | |
ip45.80.228.233 | — | |
ip89.208.103.145 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hashcef13d2e5a9d1e200a50a6b3834cc7a9 | — | |
hashded8deb7ff580788cc58cbbf5508f3bf | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://gettranslate.ir:18443/baner?sig=ded8deb7ff580788cc58cbbf5508f3bf&BanerId=347333 | — | |
urlhttps://gettranslate.ir:18443 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaingettranslate.ir | — | |
domainjackpotshop.life | — |
Threat ID: 6983b358f9fa50a62fac6fc3
Added to database: 2/4/2026, 9:00:08 PM
Last enriched: 2/4/2026, 9:15:15 PM
Last updated: 2/6/2026, 2:13:52 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumSystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.