DNS Security Review

The first example of additional techniques we’ve observed uses legitimate services to query IP assignments for malicious domains. By using these services, Trident Ursa is effectively bypassing DNS and DNS logging for the malicious domains.
 
By using these services, Trident Ursa is effectively bypassing DNS and DNS logging for the malicious domains.
Bypassing DNS Through a Messaging Service
Once opened, this .lnk shortcut uses mshta.exe
a loader that drops two files and eventually runs them as VBScripts using the wscript application.
I am pretty sure that DNS would block C&C server, but still, I block social media on my main browser, mshta.exe is disallowed and WSH is disabled. Pretty lame malware.
 
Abuse of legit services is nothing brand new as for example Google Firebase is one of those.



Here's a bit deeper analysis on the use of Firebase and this was already being done by attackers in 2020.