Glimpse is a newly uncovered hacking tool that is believed to be the creation of the OilRig group. This hacking group is also known as APT34 (Advanced Persistent Threat) and originates from Iran. Malware researchers have been familiar with the OilRig hacking group for a while, and they are known to be highly-skilled and very threatening. The Glimpse malware is built in a very interesting fashion. The Glimpse threat uses the DNS protocol instead of utilizing the usual, and rather noisy FTP or HTTP connections. However, despite this significantly reducing the noise of the harmful operation, it has some significant negative sides too. The use of the DNS protocol hinders the capabilities of the Glimpse threat greatly. The reason behind this is that this method only supports certain characters and has a limited quantity of data that can be transferred, therefore handicapping the malware.
The Four Primary Record Types
There are four main records ,which are supported by the DNS protocol:
- CNAME (Canonical Name) Records – They connect a certain hostname to the domain or sub-domain.
- TXT Records – Serve to store different text, usually linked to domain information such as address, name, contact, etc., or data regarding verification (like the Sender Policy Framework data).
- A Records – The basic record type, which serves to connect a specific IP address to a domain or sub-domain.
- MX (Mail Exchange) Records – Serve the same purpose as A Records but possess a 'priority' feature, which determines a secondary mail server in case the primary one is not working.
Cybersecurity researchers have determined that the OilRig hacking group has so far utilized the TXT type and the A record types in their threatening campaign, with the A Records serving as a priority technique. The OilRig group has custom-built the TXT records DNS queries but also uses pre-made DNS queries for the A records.
Building a threat that uses the DNS protocol is certainly not an easy task as the con artists need to be very creative and inventive to make a functional and harmful threat despite its limited abilities. It has not been revealed what the OilRig group is using the Glimpse malware for, but rest assured that we will keep hearing about these threatening campaigns in the future.
Do You Suspect Your PC May Be Infected with Glimpse & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Glimpse as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.