Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    TrendAI Patches Apex One Zero-Day Exploited in the Wild

    May 23, 2026

    This Week’s Awesome Tech Stories From Around the Web (Through May 23)

    May 23, 2026

    The My Pixel app appears to be broken for some Pixel users

    May 23, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains
    ‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains
    Cybersecurity

    ‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains

    The Tech GuyBy The Tech GuyMay 23, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    Threat actors are exploiting a vulnerability in shared content delivery network (CDN) infrastructure to hide connections to malicious domains.

    Advertisement

    Dubbed Underminr, the issue is a variant of domain fronting, a now-mitigated type of attack that enabled threat actors to place an allowed domain in the SNI and TLS certificate validation fields of an HTTPS request, while embedding a different target domain in the TLS tunnel’s encrypted HTTP host header.

    Because CDNs routed requests internally based on the host headers, the request reached the hidden destination, while traffic would appear to be going to a reputable front domain.

    Instead of using a front domain, Underminr presents the SNI and HTTP Host of a domain while forcing a request to the IP address of another tenant on the same shared edge.

    The mismatch, ADAMnetworks reports, has been exploited in attacks targeting large-scale hosting providers, including those that have implemented mitigations against domain fronting.

    “This abuse permits connections that appear to go to a trusted domain to actually connect to another domain that could be used for malicious intent,” the web security firm explains.

    Advertisement. Scroll to continue reading.

    Threat actors can abuse Underminr to hide connections to command-and-control (C&C) servers, as well as VPN and proxy connections, and to circumvent network egress policies.

    “In the simple form, the detection gap appears when DNS decisions, edge IPs, SNI, Host headers, and CDN tenant routing are not correlated. The endpoint sees an allowed DNS lookup while the connection can complete against a different hosted name,” ADAMnetworks says.

    According to the company, the attack technique has been abused in attacks to connect to domains hosted on CDN infrastructure shared with allowed domains, mostly via TCP connections on port 443, in which SNI exposes the intended TLS hostname.

    The Underminr vulnerability can be exploited using four different strategies to circumvent the DNS query monitoring and filtering service Protective DNS (PDNS).

    In real-world scenarios, attackers can launch attacks using malicious applications and shell scripts. The vulnerability can also be abused in ClickFix attacks, ADAMnetworks says.

    There are approximately 88 million domains potentially affected by Underminr, with internet infrastructure in the US, the UK, and Canada most impacted. Threat actors’ increased reliance on AI is expected to lead to a surge in attacks.

    “Once Underminr becomes parametric information for AI-generated malware, we could expect to see it in every attack that needs to evade protective DNS as part of the attack chain,” ADAMnetworks CEO David Redekop says.

    Related: $10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

    Related: US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

    Related: Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks

    Related:Microsoft Warns of ClickFix Attack Abusing DNS Lookups

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    TrendAI Patches Apex One Zero-Day Exploited in the Wild

    May 23, 2026

    ‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested

    May 23, 2026

    In Other News: Industrial Router Exploitation, CISA KEV Nomination Form, Gas Station Hacking

    May 23, 2026

    Drupal Vulnerability in Hacker Crosshairs Shortly After Disclosure

    May 22, 2026

    Canadian Man Arrested for Operating Kimwolf Botnet

    May 22, 2026

    Drupal Patches Highly Critical Vulnerability Exposing Websites to Hacking

    May 22, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    TrendAI Patches Apex One Zero-Day Exploited in the Wild

    May 23, 2026

    This Week’s Awesome Tech Stories From Around the Web (Through May 23)

    May 23, 2026

    The My Pixel app appears to be broken for some Pixel users

    May 23, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.