DNS tunneling is a command and control technique where an attacker abuses the Domain Name System to exchange commands and data with a compromised system. It leverages the fact that DNS traffic is widely trusted and rarely blocked, rather than exploiting a traditional software vulnerability.
Attackers deliver encoded commands or stolen data within DNS query and response traffic directed to attacker-controlled domains. Once the compromised endpoint initiates these requests, the attacker decodes the payload and sends instructions back through DNS responses, allowing command-and-control communication to persist while blending into legitimate network activity.
DNS tunneling enables attackers to maintain stealthy command and control access even in restricted enterprise networks. A single compromised endpoint can be used to exfiltrate sensitive data, receive further payloads, or sustain long-term persistence without triggering perimeter or proxy-based security controls.
In October 2025, security researchers uncovered a massive DNS-based malware campaign tracked as Detour Dog, where tens of thousands of compromised websites were abused to embed structured DNS queries and responses that functioned as covert command and control and payload delivery channels. Infected sites generated malicious DNS TXT record lookups that encoded victim data and fetched remote instructions, enabling multi-stage malware deployment and stealthy remote control through DNS infrastructure.
SourceGet our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.
See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.
Read moreDiscover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.
Read moreGet a clear, practical guide to understanding threats and strengthening your organization’s security.
Read more