Warning issued over ‘fast flux’ techniques used to obscure malicious signals on compromised networks
Cybersecurity agencies have issued a stark message that too little is being done to sniff out malware hiding in corporate networks


Organizations are at risk of falling prey to a common network vulnerability that allows threat actors to evade detection and spread malware with impunity, law enforcement agencies have warned.
‘Fast flux’ is a domain-based technique used to hide communications sent by malware to its command and control (C2) infrastructure – the malicious servers that send out updates and new directions to malware on infected devices.
It works by repeatedly changing the DNS records for the C2 infrastructure so that no one domain is easily identifiable by the victim’s cybersecurity team.
Constantly shifting IP addresses also means that even if one is flagged as malicious and blocked, the malware can easily contact the C2 again through any number of other addresses.
To make matters harder for cybersecurity teams, the commands sent to the malware are often relayed via botnets, a swarm of infected devices. This further muddies the water when it comes to tracing signals, giving the hackers behind the C2 an extra layer of anonymity.
A more intensive method known as ‘double flux’ sees threat actors also swap out the DNS name servers used to store records for their malicious site, as an additional protection against being discovered by law enforcement.
Fast flux allows threat groups to cycle out IP addresses as many as several hundred times in a day, severely limiting the capability of security teams to pin down their malicious communications.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
‘Fast flux’ techniques are being used to devastating effect
The use of fast flux techniques have been observed in Hive ransomware activity, by other ransomware groups as well as state-sponsored entities such as the Russian advanced persistent threat (APT) group, Aqua Blizzard.
The methods were laid out in an advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) alongside the National Security Agency (NSA) and Federal Bureau of Investigation (FBI).
Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand’s National Cyber Security Centre (NCSC-NZ) also issues the joint warning.
The combined law enforcement agencies noted that fast flux is also used to prevent authorities from disabling social engineering websites and to keep hacking forums online.
Fighting fast flux
To mitigate the threat posed by these techniques, security experts urged all organizations to adopt protective domain name system (PDNS) services, which come with features such as DNS sinkholing.
This allows security teams to intercept and block malicious DNS requests, thereby stemming the flow of attacks and flagging infected.
PDNS services also offer advanced monitoring, filtering, and analysis. It is available via a range of providers, as well as free of charge to select services in the UK via the National Cyber Security Centre (NCSC).
“Fast flux is an ongoing, serious threat to national security, and this guidance shares important insight we’ve gathered about the threat,” said Dave Luber, NSA Cybersecurity Director.
“It is imperative cybersecurity providers, especially Protective DNS providers, follow these guidelines to safeguard critical infrastructure and sensitive information.”
In addition to their advice for all organizations, the combined agencies provided cybersecurity service providers (CSPs) and internet service providers (ISPs) with a number of techniques known to produce good results against fast flux.
This included greater reliance on intelligence feeds to flag malicious domains, better use of anomaly detection to detect domains with unusually diverse IP addresses or geolocation data, and to create advanced algorithms that can match anomalous behavior with fast flux methodology.
MORE FROM ITPRO

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Google tells some remote workers to return to the office or risk losing jobs
News Google has warned remote workers will need to return to the office or else lose their jobs, according to reports.
By Ross Kelly
-
IBM puts on a brave face as US government cuts hit 15 contracts
News Despite the cuts, IBM remains upbeat after promising quarterly results
By Nicole Kobie
-
Hackers are using Zoom’s remote control feature to infect devices with malware
News Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices.
By Ross Kelly
-
CISA issues warning in wake of Oracle cloud credentials leak
News The security agency has published guidance for enterprises at risk
By Ross Kelly
-
Hackers are duping developers with malware-laden coding challenges
News A North Korean state-sponsored group has been targeting crypto developers through fake coding challenges given as part of the recruitment process.
By Emma Woollacott
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott
-
This potent malware variant can hijack your Windows PC, steal passwords, and more: Neptune RAT is spreading on GitHub, Telegram, and even YouTube – and experts warn 'anyone could use it to launch attacks'
News Neptune RAT can hijack Windows PCs and steal passwords – and it's spreading fast
By Emma Woollacott
-
Fake file converter tools are on the rise – here’s what you need to know
News The FBI has issued an alert over the rise of fake file converter tools available online after observing a spate of scams and ransomware attacks.
By Emma Woollacott
-
Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malware
News Threat actors are exploiting users’ familiarity with verification tests to trick them into loading malware onto their systems, new research has warned.
By Solomon Klappholz