LIVE NEWS
  • Israeli Strikes Pummel Lebanon, Killing Medics Amid Fragile Truce
  • Binance Denies WSJ Report Alleging $850M in Iran-Linked Crypto Transactions
  • ‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains
  • Lawyers, Policy Experts React to Trump’s Green Card Crackdown
  • A Lull in Fighting Gave Time to Bury Their Dead
  • Uber and DoorDash hold talks with Delivery Hero over potential buyout
  • Space Force needs to prepare for an ‘in-person’ moon conflict with China, new report argues
  • Mercury may have gained all of its unexpected water in a single day
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains
Cybersecurity

‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains

primereportsBy primereportsMay 23, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains
Share
Facebook Twitter LinkedIn Pinterest Email


Threat actors are exploiting a vulnerability in shared content delivery network (CDN) infrastructure to hide connections to malicious domains.

Dubbed Underminr, the issue is a variant of domain fronting, a now-mitigated type of attack that enabled threat actors to place an allowed domain in the SNI and TLS certificate validation fields of an HTTPS request, while embedding a different target domain in the TLS tunnel’s encrypted HTTP host header.

Because CDNs routed requests internally based on the host headers, the request reached the hidden destination, while traffic would appear to be going to a reputable front domain.

Instead of using a front domain, Underminr presents the SNI and HTTP Host of a domain while forcing a request to the IP address of another tenant on the same shared edge.

The mismatch, ADAMnetworks reports, has been exploited in attacks targeting large-scale hosting providers, including those that have implemented mitigations against domain fronting.

“This abuse permits connections that appear to go to a trusted domain to actually connect to another domain that could be used for malicious intent,” the web security firm explains.

Advertisement. Scroll to continue reading.

Threat actors can abuse Underminr to hide connections to command-and-control (C&C) servers, as well as VPN and proxy connections, and to circumvent network egress policies.

“In the simple form, the detection gap appears when DNS decisions, edge IPs, SNI, Host headers, and CDN tenant routing are not correlated. The endpoint sees an allowed DNS lookup while the connection can complete against a different hosted name,” ADAMnetworks says.

According to the company, the attack technique has been abused in attacks to connect to domains hosted on CDN infrastructure shared with allowed domains, mostly via TCP connections on port 443, in which SNI exposes the intended TLS hostname.

The Underminr vulnerability can be exploited using four different strategies to circumvent the DNS query monitoring and filtering service Protective DNS (PDNS).

In real-world scenarios, attackers can launch attacks using malicious applications and shell scripts. The vulnerability can also be abused in ClickFix attacks, ADAMnetworks says.

There are approximately 88 million domains potentially affected by Underminr, with internet infrastructure in the US, the UK, and Canada most impacted. Threat actors’ increased reliance on AI is expected to lead to a surge in attacks.

“Once Underminr becomes parametric information for AI-generated malware, we could expect to see it in every attack that needs to evade protective DNS as part of the attack chain,” ADAMnetworks CEO David Redekop says.

Related: $10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

Related: US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

Related: Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks

Related:Microsoft Warns of ClickFix Attack Abusing DNS Lookups

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLawyers, Policy Experts React to Trump’s Green Card Crackdown
Next Article Binance Denies WSJ Report Alleging $850M in Iran-Linked Crypto Transactions
primereports
  • Website

Related Posts

Cybersecurity

$20 per zero-day is already the WordPress plugin reality

May 23, 2026
Cybersecurity

FBI warns about fast-growing phishing kit targeting Microsoft 365 users

May 22, 2026
Cybersecurity

Fake Gemini and Claude Code Sites Spread Infostealers

May 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Israeli Strikes Pummel Lebanon, Killing Medics Amid Fragile Truce
  • Binance Denies WSJ Report Alleging $850M in Iran-Linked Crypto Transactions
  • ‘Underminr’ Vulnerability Lets Attackers Hide Malicious Connections Behind Trusted Domains
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.