Blog

The Silent DNS Poisoning Campaign Targeting Updates

by | Feb 17, 2026 | Hacking, malware, MgBot, Security Threats, Update Software

 

A stealthy campaign abused how computers find sites and updates, turning user trust into a surefire way to get infected with malware.

For over two years, a hacking group abused a crucial part of how the internet works to spread malware without alerting any defenses. By manipulating DNS settings – the system that helps computers find websites and update servers – the attackers were able to redirect routine software update checks to their own servers. Victims believed they were installing legitimate updates, but instead they installed hidden spyware. The attack was a cunning one, requiring no malicious links or user mistakes, relying entirely on the trust people place in the internet.

The Dangers of DNS Poisoning

Every time you visit a website or check for a software update, your PC relies on the Domain Name System (DNS). Essentially, the DNS is the internet’s main address book. When you type a site name into your browser, the DNS tells your machine where to find it. This entire process takes fractions of a second, so most users are unaware of what goes on behind the scenes.

But, for two years, a hacking group known as Evasive Panda found a way to quietly interfere with that process. Instead of returning the correct address, DNS responses were poisoned to redirect victims somewhere completely different. To the user, it looked as though everything was working as normal. However, in the background, it wasn’t.

When a device tried to check for a genuine software update, it was stealthily sent to a server controlled by the attackers. From there, it received files that looked like normal updates, so the victims suspected nothing. Inside these files, though, was malware called MgBot. This backdoor was designed to stay completely under the radar, silently monitoring the system and slowly stealing data in the background.

Most people were unaware that anything suspicious was happening. There were no prompts for action, no slowdowns, and no ransom demands. The PC just kept working as normal, but with an invisible presence watching from a distance.

How Can You Stay Safe?

This attack affected users in several countries and targeted systems which regularly check for software updates. As a result, it was a large and mostly silent attack which failed to raise suspicious. But this doesn’t mean it’s impossible to protect your PCs from a similar attack. To strengthen your defenses, make sure that you:

For more ways to secure and optimize your business technology, contact your local IT professionals