A stealthy campaign abused how computers find sites and updates, turning user trust into a surefire way to get infected with malware.
For over two years, a hacking group abused a crucial part of how the internet works to spread malware without alerting any defenses. By manipulating DNS settings – the system that helps computers find websites and update servers – the attackers were able to redirect routine software update checks to their own servers. Victims believed they were installing legitimate updates, but instead they installed hidden spyware. The attack was a cunning one, requiring no malicious links or user mistakes, relying entirely on the trust people place in the internet.
The Dangers of DNS Poisoning
Every time you visit a website or check for a software update, your PC relies on the Domain Name System (DNS). Essentially, the DNS is the internet’s main address book. When you type a site name into your browser, the DNS tells your machine where to find it. This entire process takes fractions of a second, so most users are unaware of what goes on behind the scenes.
But, for two years, a hacking group known as Evasive Panda found a way to quietly interfere with that process. Instead of returning the correct address, DNS responses were poisoned to redirect victims somewhere completely different. To the user, it looked as though everything was working as normal. However, in the background, it wasn’t.
When a device tried to check for a genuine software update, it was stealthily sent to a server controlled by the attackers. From there, it received files that looked like normal updates, so the victims suspected nothing. Inside these files, though, was malware called MgBot. This backdoor was designed to stay completely under the radar, silently monitoring the system and slowly stealing data in the background.
Most people were unaware that anything suspicious was happening. There were no prompts for action, no slowdowns, and no ransom demands. The PC just kept working as normal, but with an invisible presence watching from a distance.
How Can You Stay Safe?
This attack affected users in several countries and targeted systems which regularly check for software updates. As a result, it was a large and mostly silent attack which failed to raise suspicious. But this doesn’t mean it’s impossible to protect your PCs from a similar attack. To strengthen your defenses, make sure that you:
- Always Double-Check Update Prompts: Even if a software update pops up like it always has, take a few moments to verify it comes from an official source. If you’re unsure, go directly to the developer’s website instead of clicking through a random prompt.
- Use Layered Protection: It’s dangerous to rely on a single layer of protection. Firewalls, antivirus tools, and network analysis tools are unable to pick up everything, but combined they reduce the risk of silent malware slipping through.
- Scrutinize Unusual Behavior: Slowdowns, unexpected network activity, or applications behaving unusually might be an early sign of a hidden backdoor infection. While automated defenses are highly effective, human intuition can often catch malware threats much more quickly.
For more ways to secure and optimize your business technology, contact your local IT professionals





