An update on the Kaseya ransomware attack CNC domains

Command and Control Domains

The attack by REvil used several domains, called "Command and Control" domains (also referred to as "C2 domains" or "CNC domains"), which are used after a system has been attacked. The purpose in this case is to notify REvil that the systems had been encrypted.

The configuration file of the ransomware was published by Fabian Wosar on GitHub. From that file, we extracted the list of domains. These domains are not all actually compromised systems—it's likely that only a few are, and the rest are either decoys or have been cleaned up.

Out of an abundance of caution, DNSFilter has marked all of these domains as malicious. We did so on July 3rd, when the domains were first made available. We are doing our best to verify entries and investigate specific aspects of the CNC servers, in order to eliminate false positives from the list.

This was published on GitHub as a service to others—it's an unsorted list in the config file, so making this more easily available could help others who are investigating.

Important notes

The domains shouldn't be taken as a list of compromised systems. It is simply an extract from the config file of domains marked there as "command and control".

If there are any entries that can be verified as clean, please contact us or submit a pull request on the GitHub repository.

Further information

For more information on REvil and the Kaseya ransomware attack, please check out these thorough overviews:

Search
  • There are no suggestions because the search field is empty.
Latest posts
The Consequences of Non-Compliance and Managing Risks with DNS Filtering The Consequences of Non-Compliance and Managing Risks with DNS Filtering

Compliance doesn’t have to be complicated. With the right safeguards in place, many of the day-to-day requirements can be met with simple, lightweight controls. The real challenge isn’t necessarily the effort to stay compliant, but the consequences of slipping out of compliance.

How to Block Unwanted Websites On The Company Network How to Block Unwanted Websites On The Company Network

Internet access is essential to the productivity of most organizations—but not everything on the Internet is work-appropriate or safe. From time-wasting sites to phishing domains, employees can unintentionally expose your company to productivity loss, legal risks, or cyber threats just by visiting the wrong webpage. And before you think it couldn’t happen to you or your team—even the most cybersecurity aware can be duped by emerging threats like ...

DNS Filtering: How Does It Work? DNS Filtering: How Does It Work?

DNS Overview: What Is It and Why Does It Matter?

When you type a web address (like www.example.com) into your browser, a Domain Name System (DNS) lookup occurs behind the scenes. This process translates the website’s domain name into its corresponding IP address (e.g., 123.45.67.89). Some people compare DNS to a phonebook or directory for the internet.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.