Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

OSINT - New Wekby Attacks Use DNS Requests As Command and Control Mechanism

0
Low
Published: Wed May 25 2016 (05/25/2016, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: tlp
Product: white

Description

OSINT - New Wekby Attacks Use DNS Requests As Command and Control Mechanism

AI-Powered Analysis

AILast updated: 07/03/2025, 02:11:54 UTC

Technical Analysis

The reported threat involves a campaign identified as 'New Wekby Attacks' that utilize DNS requests as a command and control (C2) mechanism. Wekby is a known malware family that has historically targeted financial institutions and related entities. The use of DNS requests for C2 communication is a sophisticated technique that leverages the ubiquitous and often less-monitored DNS protocol to evade detection. In this method, infected hosts encode commands or data within DNS queries or responses, allowing attackers to control compromised systems covertly. This approach complicates traditional network monitoring because DNS traffic is typically allowed through firewalls and may not be scrutinized as closely as other protocols. The campaign was reported by CIRCL in 2016 with a low severity rating and no known exploits in the wild at the time. The technical details indicate a moderate threat level (3) and analysis confidence (2), suggesting some observed activity but limited impact or exploitation evidence. No specific affected software versions or patches are listed, implying the attack vector is more about the malware's communication method rather than exploiting a particular software vulnerability. Overall, this threat represents an advanced persistent threat (APT) technique focusing on stealthy C2 communication rather than direct exploitation, emphasizing the need for DNS traffic monitoring and anomaly detection.

Potential Impact

For European organizations, especially those in the financial sector, the use of DNS-based C2 channels by Wekby malware poses a significant risk to confidentiality and integrity. Successful infections could lead to unauthorized data exfiltration, credential theft, and potential disruption of services. The stealthy nature of DNS tunneling makes detection challenging, increasing the dwell time of attackers within networks and the potential for extensive damage. Given the critical role of financial institutions in Europe and the interconnectedness of their networks, a compromise could have cascading effects on economic stability and customer trust. Additionally, organizations with less mature DNS monitoring capabilities may be more vulnerable to prolonged undetected intrusions. However, the reported low severity and absence of known exploits in the wild suggest that while the technique is notable, widespread impact has not been observed, reducing immediate risk but not eliminating future threat potential.

Mitigation Recommendations

European organizations should implement advanced DNS monitoring and logging to detect anomalous query patterns indicative of DNS tunneling or covert C2 communication. Deploying DNS security solutions that can perform deep packet inspection and behavioral analysis will help identify suspicious DNS traffic. Network segmentation can limit malware lateral movement if an infection occurs. Employing threat intelligence feeds to update detection rules with known Wekby indicators can improve early identification. Endpoint detection and response (EDR) tools should be configured to monitor for unusual process behavior related to DNS queries. Regular security awareness training focusing on phishing and social engineering can reduce initial infection vectors. Since no patches are available, organizations must focus on detection and response capabilities. Additionally, restricting outbound DNS traffic to authorized DNS servers and implementing DNS query whitelisting can reduce exposure. Incident response plans should include procedures for investigating and mitigating DNS-based C2 communications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Threat Level
3
Analysis
2
Original Timestamp
1464161691

Threat ID: 682acdbcbbaf20d303f0b454

Added to database: 5/19/2025, 6:20:44 AM

Last enriched: 7/3/2025, 2:11:54 AM

Last updated: 2/7/2026, 2:44:03 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats