Hackers Leveraging Fast Flux Technique to Evade Detection

As cybercriminal operations grow increasingly sophisticated, threat actors adopt advanced techniques like fast flux to mask malicious infrastructure, evade defensive measures, and maintain persistent access to compromised networks. Security analysts at Silent Push observed the Russian state-linked group Gamaredon using double flux to maintain C2 channels, cycling through over 100 IP addresses daily across autonomous systems in Europe and Asia. In single flux attacks, a single domain is linked to dozens of rotating IP addresses, often hosted on compromised devices within botnets. Double flux adds another layer of obfuscation by dynamically rotating not just IP addresses but also the DNS name servers responsible for resolving the domain. Moreover, organizations can benefit from Protective DNS (PDNS) services and sinkholing techniques to disrupt fast flux infrastructure and analyze traffic patterns for compromised devices. CISA warns of threat actors’ increasing adoption of the fast flux technique to evade detection and conceal malicious server infrastructures. A 2025 ACSC report highlighted a Netherlands-based BPH firm providing clients with pre-configured flux networks, complete with geo-distributed domains and rotating ASNs. Such services allow even novice attackers to launch resilient campaigns, as evidenced by the 2024 GammaDrop malware campaign, which leveraged Cloudflare tunnels and flux DNS to bypass traditional defenses. Threat Intelligence Integration: Leveraging reputation services and identifying domains associated with fast flux activity. By hosting encryption keys and exfiltration portals on fast flux networks, they evaded IP-blocking measures long enough to extort millions from victims. While fast flux can have legitimate uses in content delivery networks (CDNs) or load balancers, its exploitation by cybercriminals poses significant risks. Fast flux is a domain-based obfuscation tactic where DNS records associated with a domain name (e.g., IP addresses) change rapidly and frequently. Detecting fast flux activity is challenging due to its resemblance to legitimate behaviors in CDNs or dynamic hosting setups. Phishing and Fraud: Fast flux enables threat actors to rapidly deploy and dismantle phishing sites. Ransomware Campaigns: Hive and Nefilim ransomware groups employed fast flux to sustain operations during 2021–2023 attacks. Bulletproof Hosting (BPH) Services: Underground providers like the Russian-based “BreachForums” now advertise fast flux as a premium feature. Fundamentally, it relies on a botnet of compromised devices spread across the internet, enabling malicious actors to cycle through numerous IP addresses in a short span of time.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 03 Apr 2025 17:35:33 +0000


Cyber News related to Hackers Leveraging Fast Flux Technique to Evade Detection

Hackers Leveraging Fast Flux Technique to Evade Detection - As cybercriminal operations grow increasingly sophisticated, threat actors adopt advanced techniques like fast flux to mask malicious infrastructure, evade defensive measures, and maintain persistent access to compromised networks. Security analysts ...
4 months ago Cybersecuritynews.com
CISA warns of Fast Flux DNS evasion used by cybercrime gangs - CISA, the FBI, the NSA, and international cybersecurity agencies are calling on organizations and DNS providers to mitigate the "Fast Flux" cybercrime evasion technique used by state-sponsored threat actors and ransomware gangs. For ...
4 months ago Bleepingcomputer.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
1 month ago Cybersecuritynews.com
US, Australia, Canada warn of ‘fast flux’ scheme used by ransomware gangs | The Record from Recorded Future News - Cybercriminals and nation-state actors use the fast flux technique to rapidly change the Domain Name System (DNS) records associated with a single domain name — hiding the locations of malicious servers, according to an advisory published on ...
4 months ago Therecord.media
Synopsys fAST Dynamic enables DevOps teams to fix security vulnerabilities in modern web apps - Synopsys released Synopsys fAST Dynamic, a new dynamic application security testing offering on the Synopsys Polaris Software Integrity Platform. fAST Dynamic enables development, security, and DevOps teams to find and fix security vulnerabilities in ...
1 year ago Helpnetsecurity.com
CVE-2022-36035 - Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes ...
2 years ago
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Best MDR (Managed Detection & Response) Solutions - 2025 - Cybereason Managed Detection and Response solutions provide 24/7 threat monitoring, advanced endpoint protection, and rapid incident response. Cynet MDR solutions provide automated threat detection and response, ensuring comprehensive security ...
4 months ago Cybersecuritynews.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
4 months ago Cybersecuritynews.com
10 Best EDR Tools ( Endpoint Detection & Response) - 2025 - What is good?What Could Be Better ?Provides comprehensive endpoint monitoring.Some users might find the installation and configuration process of the solution tedious.Protect your entire security stack with in-depth threat intelligence.Some users ...
4 months ago Cybersecuritynews.com
Top 10 XDR (Extended Detection & Response) Solutions - 2025 - CrowdStrike Falcon XDR uses this data to extend EDR outcomes and advanced threat detection across the security stack, thereby stopping breaches more quickly. It does this by using CrowdStrike’s world-class machine learning, artificial ...
4 months ago Cybersecuritynews.com
Improving Threat Detection: The Role Of MDR And XDR In Your Security Operations - MDR and XDR represent the next generation of threat detection and response, addressing the limitations of traditional security tools and enabling organizations to stay ahead of sophisticated adversaries. For organizations just beginning to mature ...
3 months ago Cybersecuritynews.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
3 months ago Cybersecuritynews.com Inception
How To Use YARA Rules To Identify Financial Sector Targeted Attacks - By analyzing multiple samples from the same malware family, security teams can create YARA rules that identify various iterations of the threat, even as attackers attempt to modify their code to evade detection. By scanning network traffic for ...
3 months ago Cybersecuritynews.com Hunters
New Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defenses - Unlike traditional thread hijacking, which requires suspending and resuming threads using easily monitored APIs like SuspendThread and ResumeThread, WTH targets threads already in a waiting state, eliminating the need for suspicious thread ...
3 months ago Cybersecuritynews.com
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
2 years ago Bleepingcomputer.com
A primer on storage anomaly detection - Anomaly detection plays an increasingly important role in data and storage management, as admins seek to improve security of systems. In response to these developments, more vendors incorporate storage anomaly detection capabilities into their ...
1 year ago Techtarget.com
Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets - Unit 42 researchers have observed threat actors using malicious JavaScript samples to steal sensitive information by abusing popular survey sites, low-quality hosting and web chat APIs. In this article, we'll describe some of the tactics used by ...
1 year ago Unit42.paloaltonetworks.com
CVE-2022-49124 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
GrimResource Technique Exploits Years-Old Unpatched Windows XSS Flaw - New GrimResource technique exploits a 2018-old, unpatched, Windows XSS flaw and crafted MSC files to deploy malware via the Microsoft Management Console. Researchers detected the new exploitation technique in the wild on June 6th, 2024. Exploiting ...
1 year ago Heimdalsecurity.com
Why It's More Important Than Ever to Align to The MITRE ATT&CK Framework - These missed attacks often stem from either hidden gaps in detection coverage - or due to alerts that got buried in a sea of noisy alerts and were never even pursued by the Security Operations Center team. In other words, we need to be able to report ...
1 year ago Cyberdefensemagazine.com APT28 FIN7 LAPSUS$ Lazarus Group
ClickFix Attack Emerges by Over 500% - Hackers Actively Using This Technique to Trick Users - The attack presents victims with fake error messages or verification prompts that appear legitimate, instructing them to copy and paste seemingly harmless commands to resolve fictitious technical issues. Unlike traditional attack methods, ClickFix ...
1 month ago Cybersecuritynews.com Kimsuky Lazarus Group MuddyWater APT3
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
MacOS info-stealers quickly evolve to evade XProtect detection - Multiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently. A report by SentinelOne highlights the problem through three ...
1 year ago Bleepingcomputer.com
PRODUCT REVIEW: ENEA QOSMOS THREAT DETECTION SDK - The Qosmos Threat Detection Software Development Kit is Enea's innovative solution to the demand for more robust, adaptable, and high-performance network threat detection platforms. ADVANCED THREAT DETECTION WITH SUPERIOR TRAFFIC VISIBILITY. ...
1 year ago Cybersecurity-insiders.com