Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New Malware Framework: Screen Control, Browser & Enables Artifact
May 14, 2026
node-ipc npm Package Compromised in Supply Weekly Downloads
May 14, 2026
TeamPCP and BreachForums Hackers Running $1,000 Contest for Supply
May 14, 2026
Home/Threats/Shadow DNS Hacking Routers Internet Traffic Through Compromised
Threats

Shadow DNS Hacking Routers Internet Traffic Through Compromised

Users generally trust their routers to direct internet traffic accurately. However, few consider that these critical “signposts” of the web are themselves vulnerable to manipulation. A...

Jennifer sherman
Jennifer sherman
February 4, 2026 2 Min Read
4 0

Users generally trust their routers to direct internet traffic accurately. However, few consider that these critical “signposts” of the web are themselves vulnerable to manipulation.

A sophisticated “shadow” network has been silently hijacking home internet connections by compromising vulnerable routers and altering their DNS configurations.

Instead of using a legitimate Service Provider’s servers, these infected devices send all web traffic queries to malicious resolvers hosted by Aeza International, a bulletproof hosting firm previously sanctioned by the US government.

This silent redirection allows threat actors to selectively manipulate which websites users can reach, often steering them toward fraudulent advertising platforms or malicious scams.

While popular sites like Google often resolve correctly to avoid suspicion, specific targets trigger a complex redirection chain.

This involves a secondary HTTP-based Traffic Distribution System (TDS) that fingerprints the victim’s device before delivering the final payload.

Infoblox analysts identified this widespread campaign after connecting scattered user reports of “insane” internet behavior with anomalous DNS patterns.

They observed that the threat actors largely target older router models, fundamentally altering the trust chain for every device on the home network.

Victims reported bizarre issues, such as an inability to access Google Sheets or persistent browser redirects, often assuming their computers—not their routers—were at fault.

The EDNS0 Evasion Technique

The most technically intriguing aspect of this campaign is its stealthy evasion method. Security analysts initially struggled to replicate the malicious DNS responses because the rogue servers would not answer standard queries.

The breakthrough came when analysts discovered that the shadow resolvers only respond if the Extension Mechanisms for DNS (EDNS0) protocol is explicitly disabled.

An overview of the two-part TDS hosted in Aeza International (Source - Infoblox)
An overview of the two-part TDS hosted in Aeza International (Source – Infoblox)

Since EDNS0 is a standard protocol extension used by almost all modern legitimate resolvers to handle larger packet sizes and security features, standard security scanning tools automatically include it.

By configuring their servers to ignore these standard queries, the attackers effectively made their infrastructure invisible to automated scans and most security researchers.

This simple yet effective filter allowed the malicious network to operate undetected for years, serving correct IP addresses to researchers while delivering hijacked responses to actual victims using older, non-compliant equipment or specific configurations.

To mitigate this threat, users must audit router configurations for unauthorized DNS settings.

Updating router firmware to the latest versions is critical, as is replacing obsolete hardware that no longer receives security patches to prevent initial compromise.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackPatchSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Hackers Exfiltrating NTDS.dit File to Gain Full Active Directory

Next Post

Threat Actors Attack Enterprise Users via Microsoft & Google

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Dell SupportAssist Updates Force Windows to BSOD Loop
May 14, 2026
Critical Exim Mailer Flaw Allows Remote Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us