Close Menu
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
What's Hot

The Basic Corporate Error Of Maximizing Shareholder Returns

May 31, 2025

U.S. birth rate drop outpaces policy response, raising future concerns

May 31, 2025

Arvest Bank glitch enabled customers to see others’ data

May 31, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Smart SpendingSmart Spending
Subscribe
  • Home
  • Finance News
  • Personal Finance
  • Investing
  • Cards
    • Credit Cards
    • Debit
  • Insurance
  • Loans
  • Mortgage
  • More
    • Save Money
    • Banking
    • Taxes
    • Crime
Smart SpendingSmart Spending
Home»Banking»Cyber agencies warn of fast flux threat tactics
Banking

Cyber agencies warn of fast flux threat tactics

April 8, 2025No Comments5 Mins Read
Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
Cyber agencies warn of fast flux threat tactics
Share
Facebook Twitter LinkedIn Pinterest Email

Three U.S. cybersecurity-focused agencies, alongside similar agencies in Australia, Canada and New Zealand, recently issued a warning about fast flux, a type of tactic threat actors use to avoid detection and eviction from networks.

Fast flux provides threat actors with network redundancy and enables them to avoid drawing too much attention to any specific network resource — such as an IP address, a name server or a domain name. It is useful for hiding compromises in a network that institutions would typically detect by, for example, figuring out which IP addresses computers are connecting to most often.

“This resilient and fast changing infrastructure makes tracking and blocking malicious activities that use fast flux more difficult,” reads the report from the FBI, the National Security Agency and the other agencies that issued the warning.

Fast flux is a tactic threat actors most often use in command and control (C2) infrastructure. These are systems that threat actors use to control computers in the target’s network. Often, these computers have malware installed on them, but installing the malware is only part of the battle; the threat actor then has to have the computer “phone home” (i.e., connect to the threat actor’s own computer) while avoiding detection.

One of the key malicious technologies that enable the fast flux tactic is botnets. A botnet consists of internet-connected devices that, often unbeknownst to the device’s owner, are controlled by a threat actor. These devices might be laptops, IoT devices or anything else that connects to the internet.

Botnets arm threat actors with huge numbers of computers through which they can proxy web requests, to obfuscate their behavior. This is most helpful when attacking institutions that have dedicated cybersecurity staff to detecting this behavior.

See also  Trump funding freeze is existential threat: Morehouse College president

At the most basic level, fast flux allows a threat actor to use a huge number of unconnected IP addresses, so that no single address looks too suspicious. If a computer consistently makes numerous requests to a single IP address, that address will likely get the attention of a network analyst, eventually leading to the intruder getting noticed.

For this and other reasons, threat actors often use pools of IP addresses. This allows them to spread activity over numerous addresses, so that no single address draws too much attention.

This is part of the fast flux approach. The threat actor changes the IP address they are using to connect to a compromised host, often every five minutes or so, to the next address in the pool.

The threat actor changes the IP address they are using to connect to the compromised host by changing the DNS records on the name server the host uses. Name servers take a domain name (such as americanbanker.com) and map it to the IP address (such as 15.197.254.45) to which the computer can actually connect. DNS records define these mappings.

This graphic from the joint advisory illustrates single flux — the most basic form of fast flux that involves only switching between IP addresses. In double flux, which involves changing name servers, the cyber actor also controls a pool of DNS servers that frequently change.

More advanced fast flux schemes involve rotating not just IP addresses but the name server as well.

Rather than hitting the same name server with DNS requests every time the compromised host tries to connect to the malicious network, the threat actor rotates through a number of name servers. Just like rotating through IP addresses makes each IP address less suspicious, rotating through name servers prevents any one of the servers from getting too much attention.

See also  Watchdog: Agencies followed 'best practices' for Basel III

Another technical advancement a malicious actor can make to fast flux is rotating through domain names. This ensures not only that no single domain name draws too much attention, but that if a domain name gets shut down or blacklisted, the threat actor can rely instead on a different one to connect to compromised hosts.

Few methods exist for directly disrupting fast flux behavior. Rather, the agencies that issued the warning recommended stakeholders develop and implement scalable solutions to close “this ongoing gap in network defenses” and issued a number of indirect countermeasures.

“Quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics,” reads the warning.

The warning specifically called out protective DNS, or PDNS, providers as needing to help mitigate the threat of fast flux. These providers support the DNS system that malicious actors exploit to avoid detection; the warning implored these providers to implement anomaly detection to identify domains that frequently switch between IP addresses, especially if those addresses have inconsistent geolocations.

As for other organizations, the agencies encouraged the practice of sinkholing malicious activity once it is discovered. Sinkholing means redirecting traffic from malicious domains to a server that can capture and analyze the traffic — essentially intercepting messages meant for compromised hosts, to help identify other compromises.

While fast flux is meant to circumvent blacklists, the agencies nonetheless recommend blocking traffic to and from IP addresses with poor reputations, especially ones identified as participating in fast flux activity.

See also  CFPB sues Walmart and Branch over opening accounts

Sharing indicators of compromise, especially IP addresses that are involved in these schemes, can also help other institutions avoid it.

Source link

agencies Cyber FAST flux tactics Threat warn
Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
Previous Article7 Money Lessons We Can Take From the Roman Empire
Next Article Market volatility won’t impact Mediobanca deal: Monte dei Paschi CEO

Related Posts

Arvest Bank glitch enabled customers to see others’ data

May 31, 2025

Wells Fargo to sell its railcar business for $4.4 billion

May 31, 2025

Bank Mergers Are Booming. Here’s Why Savers Should Watch Their Wallets

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Ginnie Mae acting president steps down

November 15, 2024

Judge strikes blow to CFPB’s $8 credit card late fee rule

December 9, 2024

Pay Off Debt Fast With These 3 Simple Year End Challenges

November 28, 2024
Ads Banner

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

Stay informed with our finance blog! Get expert insights, money management tips, investment strategies, and the latest financial news to help you make smart financial decisions.

We're social. Connect with us:

Facebook X (Twitter) Instagram YouTube
Top Insights

The Basic Corporate Error Of Maximizing Shareholder Returns

May 31, 2025

U.S. birth rate drop outpaces policy response, raising future concerns

May 31, 2025

Arvest Bank glitch enabled customers to see others’ data

May 31, 2025
Get Informed

Subscribe to Updates

Subscribe to Get the Latest Financial Tips and Insights Delivered to Your Inbox!

© 2025 Smartspending.ai - All rights reserved.
  • Contact
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.