Close Menu
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
What's Hot

Investors are piling into big, short Treasury bets with Warren Buffett

June 1, 2025

Social Security checks may be smaller for some as garnishments begin

June 1, 2025

A Better Default For Managing Money And Relationships

June 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Smart SpendingSmart Spending
Subscribe
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
Smart SpendingSmart Spending
Home»Banking»Cyber agencies warn of fast flux threat tactics
Banking

Cyber agencies warn of fast flux threat tactics

April 8, 2025No Comments5 Mins Read
Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
Cyber agencies warn of fast flux threat tactics
Share
Facebook Twitter LinkedIn Pinterest Email

Three U.S. cybersecurity-focused agencies, alongside similar agencies in Australia, Canada and New Zealand, recently issued a warning about fast flux, a type of tactic threat actors use to avoid detection and eviction from networks.

Fast flux provides threat actors with network redundancy and enables them to avoid drawing too much attention to any specific network resource — such as an IP address, a name server or a domain name. It is useful for hiding compromises in a network that institutions would typically detect by, for example, figuring out which IP addresses computers are connecting to most often.

“This resilient and fast changing infrastructure makes tracking and blocking malicious activities that use fast flux more difficult,” reads the report from the FBI, the National Security Agency and the other agencies that issued the warning.

Fast flux is a tactic threat actors most often use in command and control (C2) infrastructure. These are systems that threat actors use to control computers in the target’s network. Often, these computers have malware installed on them, but installing the malware is only part of the battle; the threat actor then has to have the computer “phone home” (i.e., connect to the threat actor’s own computer) while avoiding detection.

One of the key malicious technologies that enable the fast flux tactic is botnets. A botnet consists of internet-connected devices that, often unbeknownst to the device’s owner, are controlled by a threat actor. These devices might be laptops, IoT devices or anything else that connects to the internet.

Botnets arm threat actors with huge numbers of computers through which they can proxy web requests, to obfuscate their behavior. This is most helpful when attacking institutions that have dedicated cybersecurity staff to detecting this behavior.

See also  Watchdog: Agencies followed 'best practices' for Basel III

At the most basic level, fast flux allows a threat actor to use a huge number of unconnected IP addresses, so that no single address looks too suspicious. If a computer consistently makes numerous requests to a single IP address, that address will likely get the attention of a network analyst, eventually leading to the intruder getting noticed.

For this and other reasons, threat actors often use pools of IP addresses. This allows them to spread activity over numerous addresses, so that no single address draws too much attention.

This is part of the fast flux approach. The threat actor changes the IP address they are using to connect to a compromised host, often every five minutes or so, to the next address in the pool.

The threat actor changes the IP address they are using to connect to the compromised host by changing the DNS records on the name server the host uses. Name servers take a domain name (such as americanbanker.com) and map it to the IP address (such as 15.197.254.45) to which the computer can actually connect. DNS records define these mappings.

This graphic from the joint advisory illustrates single flux — the most basic form of fast flux that involves only switching between IP addresses. In double flux, which involves changing name servers, the cyber actor also controls a pool of DNS servers that frequently change.

More advanced fast flux schemes involve rotating not just IP addresses but the name server as well.

Rather than hitting the same name server with DNS requests every time the compromised host tries to connect to the malicious network, the threat actor rotates through a number of name servers. Just like rotating through IP addresses makes each IP address less suspicious, rotating through name servers prevents any one of the servers from getting too much attention.

See also  Morgan Stanley Swiss unit fined $1.1 million in Greek bribery case

Another technical advancement a malicious actor can make to fast flux is rotating through domain names. This ensures not only that no single domain name draws too much attention, but that if a domain name gets shut down or blacklisted, the threat actor can rely instead on a different one to connect to compromised hosts.

Few methods exist for directly disrupting fast flux behavior. Rather, the agencies that issued the warning recommended stakeholders develop and implement scalable solutions to close “this ongoing gap in network defenses” and issued a number of indirect countermeasures.

“Quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics,” reads the warning.

The warning specifically called out protective DNS, or PDNS, providers as needing to help mitigate the threat of fast flux. These providers support the DNS system that malicious actors exploit to avoid detection; the warning implored these providers to implement anomaly detection to identify domains that frequently switch between IP addresses, especially if those addresses have inconsistent geolocations.

As for other organizations, the agencies encouraged the practice of sinkholing malicious activity once it is discovered. Sinkholing means redirecting traffic from malicious domains to a server that can capture and analyze the traffic — essentially intercepting messages meant for compromised hosts, to help identify other compromises.

While fast flux is meant to circumvent blacklists, the agencies nonetheless recommend blocking traffic to and from IP addresses with poor reputations, especially ones identified as participating in fast flux activity.

See also  Where can I get a fast business loan?

Sharing indicators of compromise, especially IP addresses that are involved in these schemes, can also help other institutions avoid it.

Source link

agencies Cyber FAST flux tactics Threat warn
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
Previous Article7 Money Lessons We Can Take From the Roman Empire
Next Article Market volatility won’t impact Mediobanca deal: Monte dei Paschi CEO

Related Posts

What is a cashier’s check? Definitions, uses, how to buy one, cost and alternatives

June 1, 2025

How to save $1,000 in a month: 10 strategies

May 31, 2025

Here’s what banks must do to secure open banking data

May 31, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

How to make debt work for you and build wealth with a personal loan

November 14, 2024

Life Transitions: An Expert Guide to Thriving During And After Big Transitions (Like Graduation or Retirement)

April 14, 2025

Is Taking Social Security at 62 a Huge Mistake?

December 15, 2024
Ads Banner

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

Stay informed with our finance blog! Get expert insights, money management tips, investment strategies, and the latest financial news to help you make smart financial decisions.

We're social. Connect with us:

Facebook X (Twitter) Instagram YouTube
Top Insights

Investors are piling into big, short Treasury bets with Warren Buffett

June 1, 2025

Social Security checks may be smaller for some as garnishments begin

June 1, 2025

A Better Default For Managing Money And Relationships

June 1, 2025
Get Informed

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

© 2025 Smartspending.ai - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.