An update on the Kaseya ransomware attack CNC domains

Command and Control Domains

The attack by REvil used several domains, called "Command and Control" domains (also referred to as "C2 domains" or "CNC domains"), which are used after a system has been attacked. The purpose in this case is to notify REvil that the systems had been encrypted.

The configuration file of the ransomware was published by Fabian Wosar on GitHub. From that file, we extracted the list of domains. These domains are not all actually compromised systems—it's likely that only a few are, and the rest are either decoys or have been cleaned up.

Out of an abundance of caution, DNSFilter has marked all of these domains as malicious. We did so on July 3rd, when the domains were first made available. We are doing our best to verify entries and investigate specific aspects of the CNC servers, in order to eliminate false positives from the list.

This was published on GitHub as a service to others—it's an unsorted list in the config file, so making this more easily available could help others who are investigating.

Important notes

The domains shouldn't be taken as a list of compromised systems. It is simply an extract from the config file of domains marked there as "command and control".

If there are any entries that can be verified as clean, please contact us or submit a pull request on the GitHub repository.

Further information

For more information on REvil and the Kaseya ransomware attack, please check out these thorough overviews:

Search
  • There are no suggestions because the search field is empty.
Latest posts
The DNS-Based Threats Your Firewall Ignores The DNS-Based Threats Your Firewall Ignores

Your firewall is working hard… but not smart. And cybercriminals love that.

Like a bouncer at the club with a clipboard—great at stopping the obvious troublemakers that aren’t on the list, but completely oblivious to unknown threats. They excel at blocking unauthorized access through known ports and protocols, but they often overlook a critical vulnerability: DNS traffic and what’s on the other side of a link. This oversight allows cybercrimina...

AI vs AI: Using DNS to Combat Sophisticated Cyberattacks AI vs AI: Using DNS to Combat Sophisticated Cyberattacks

Introduction: The AI Cybersecurity Arms Race

Artificial intelligence (AI) has transformed the cybersecurity landscape—both for defenders and attackers. While AI-powered cybersecurity solutions offer advanced threat detection, AI-driven cybercrime is evolving at an alarming rate, automating attacks that are more sophisticated, evasive, and dangerous.

How DNSFilter Stops Zero-Day Attacks: The Invisible Threat Costing Businesses Millions How DNSFilter Stops Zero-Day Attacks: The Invisible Threat Costing Businesses Millions

Imagine waking up to find your company's most sensitive data exposed, your systems locked, and your reputation in tatters. This nightmare scenario isn't just a hypothetical—it's the reality for businesses falling victim to zero-day attacks. In 2021, four zero-day exploits targeting Microsoft Exchange servers affected over 250,000 organizations worldwide, leaving countless systems vulnerable to data theft and ransomware.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.