Home
News
Tech Grid
Data & Analytics
Data Processing Data Management Analytics Data Infrastructure Data Integration & ETL Data Governance & Quality Business Intelligence DataOps Data Lakes & Warehouses Data Quality Data Engineering Big Data
Enterprise Tech
Digital Transformation Enterprise Solutions Collaboration & Communication Low-Code/No-Code Automation IT Compliance & Governance Innovation Enterprise AI Data Management HR
Cybersecurity
Risk & Compliance Data Security Identity & Access Management Application Security Threat Detection & Incident Response Threat Intelligence AI Cloud Security Network Security Endpoint Security Edge AI
AI
Ethical AI Agentic AI Enterprise AI AI Assistants Innovation Generative AI Computer Vision Deep Learning Machine Learning Robotics & Automation LLMs Document Intelligence Business Intelligence Low-Code/No-Code Edge AI Automation NLP AI Cloud
Cloud
Cloud AI Cloud Migration Cloud Security Cloud Native Hybrid & Multicloud Cloud Architecture Edge Computing
IT & Networking
IT Automation Network Monitoring & Management IT Support & Service Management IT Infrastructure & Ops IT Compliance & Governance Hardware & Devices Virtualization End-User Computing Storage & Backup
Human Resource Technology Agentic AI Robotics & Automation Innovation Enterprise AI AI Assistants Enterprise Solutions Generative AI Regulatory & Compliance Network Security Collaboration & Communication Business Intelligence Leadership Artificial Intelligence Cloud
Finance
Insurance Investment Banking Financial Services Security Payments & Wallets Decentralized Finance Blockchain
HR
Talent Acquisition Workforce Management AI HCM HR Cloud Learning & Development Payroll & Benefits HR Analytics HR Automation Employee Experience Employee Wellness
Marketing
AI Customer Engagement Advertising Email Marketing CRM Customer Experience Data Management Sales Content Management Marketing Automation Digital Marketing Supply Chain Management Communications Business Intelligence Digital Experience SEO/SEM Digital Transformation Marketing Cloud Content Marketing E-commerce
Consumer Tech
Smart Home Technology Home Appliances Consumer Health AI
Interviews
Think Stack
Press Releases
Articles
Resources
  • Network Security

ADAMnetworks Exposes DNS TXT Record Malware Threat


ADAMnetworks Exposes DNS TXT Record Malware Threat
  • Source: Source Logo
  • |
  • September 11, 2025

ADAMnetworks, a leader in zero trust security solutions, has revealed a sophisticated cybersecurity threat where attackers exploit DNS TXT records to distribute malware and establish command-and-control (C2) channels. This emerging tactic, which bypasses traditional security measures, underscores the need for enhanced DNS monitoring to protect enterprise networks.

Quick Intel

  • Attackers exploit DNS TXT records to hide and deliver malware.

  • Malware is encoded in hexadecimal or base64, reassembled via DNS queries.

  • Used for malware assembly, C2 communications, and data exfiltration.

  • Encrypted DNS protocols like DoH and DoT complicate detection.

  • ADAMnetworks’ platform enables policy-based TXT record blocking.

  • Over 14,000 unique domains analyzed showed both legitimate and malicious use.

Exploiting DNS TXT Records for Malicious Purposes

DNS TXT records, designed for tasks like email authentication (SPF, DKIM, DMARC) and domain verification, are being manipulated by cybercriminals to encode malware in hexadecimal or base64 formats. These fragments are distributed across subdomains and reassembled on infected devices through innocuous DNS queries, evading antivirus, email filters, and firewalls. “DNS TXT records are like the Swiss Army knife of domain data. Versatile for everything from spam prevention to software licensing, but this versatility makes them a prime target for abuse,” said David Redekop, Founder and CEO of ADAMnetworks.

Evidence from Recent Research

ADAMnetworks’ analysis of over 14,000 unique fully qualified domain names (FQDNs) revealed widespread legitimate uses of TXT records, such as for Google Workspace and SSL certificate verification. However, malicious activities were also uncovered, including private IP leaks and DNS tunneling via apps like SlowDNS. Research from DomainTools identified the domain whitetreecollective[.]com hosting fragments of Joke Screenmate malware, while Infoblox noted similar tactics for deploying Cobalt Strike beacons. These findings highlight the resurgence of DNS TXT record abuse, previously considered a theoretical threat, as a significant risk since 2021-2022.

Challenges with Encrypted DNS Protocols

The rise of encrypted DNS protocols like DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) exacerbates the challenge, as they obscure query content from traditional monitoring tools, creating a blind spot in cybersecurity. This allows attackers to use TXT records for malware assembly, C2 communications, and data exfiltration without detection, posing a severe threat to enterprise security.

Mitigation Strategies for Enhanced Protection

To counter this threat, ADAMnetworks recommends a “block all, allow some” approach. Their adam:ONE Zero Trust Connectivity platform (version 4.14.2-266 and later) supports policy-based TXT record blocking with exemptions for trusted domains, preventing vulnerabilities like DNS rebinding attacks while maintaining network functionality. Organizations should audit TXT record queries, implement protective DNS services, and adopt adaptive security measures to stay ahead of evolving threats.

ADAMnetworks’ findings emphasize the urgent need for proactive DNS monitoring and robust security policies to safeguard against the sophisticated abuse of DNS TXT records, ensuring organizations can maintain secure and resilient networks.

About ADAMnetworks

ADAMnetworks specializes in Zero Trust Connectivity solutions to ensure the highest level of security. Our core offerings include a Default Deny-All security platform that utilizes AI-driven dynamic allowlisting and our patented egress control technology to proactively defend against cyber threats.

  • ADA MnetworksDNS SecurityCybersecurity ThreatMalware DetectionZero Trust
News Disclaimer
  • Share