{"id":12861,"date":"2026-02-03T07:55:59","date_gmt":"2026-02-03T15:55:59","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=12861"},"modified":"2026-02-03T08:33:04","modified_gmt":"2026-02-03T16:33:04","slug":"compromised-routers-dns-and-a-tds-hidden-in-aeza-networks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/","title":{"rendered":"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks"},"content":{"rendered":"<p>When most people say DNS, they are thinking about the global DNS system, the official mechanism for resolving domain names on the internet. But shadow systems exist. Visiting a website relies on a DNS resolution chain that iteratively queries authoritative name servers within the distributed DNS hierarchy to get an IP address. This resolution all happens in the background, and users put a lot of trust into DNS resolvers without even realizing they exist. If the IP address of those resolvers is changed, a website\u2019s domain name might resolve to an entirely different IP address, sending an unwitting visitor to an entirely different location.<\/p>\n<p>We discovered compromised routers whose DNS settings had been changed to use shadow resolvers hosted in Aeza International (AS210644), a bulletproof hosting company (BPH) <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/sb0185\" target=\"_blank\"><strong>sanctioned<\/strong><\/a> by the U.S. Government in July 2025. The DNS change meant that every device behind that router was serviced not by the local ISP\u2019s DNS resolvers, but by the threat actor. The Aeza resolvers selectively altered the responses, allowing them to direct users to a range of malicious content, all through a DNS resolution. This shadow network also incorporates an HTTP-based traffic distribution system (TDS), further allowing the actor to fingerprint users and funnel them to content of the actor\u2019s choosing. The combination of an alternate DNS and TDS, along with a clever DNS trick to prevent probing by security groups, has allowed the actor to remain undetected for years. Figure 1 provides a high-level overview of how the system works.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-figure1.jpg\" alt=\"Figure 1\" \/><\/p>\n<p class=\"image-caption\">Figure 1. An overview of the two-part TDS hosted in Aeza International<\/p>\n<p>This system appears to be operated by a financially motivated actor in the affiliate marketing space. Since mid-2022, they have directed user traffic to adtech platforms through \u201csmartlinks,\u201d a mechanism used in affiliate advertising to fingerprint a device and redirect the user to \u201cadvertising\u201d content. The links contain unregistered domains and require interaction with one of the shadow DNS servers to resolve. We use quotes here for advertising because often this content is malware or scams.<\/p>\n<p>While the actor\u2019s verified activity is affiliate marketing, they could have interfered in other ways with devices in the network. As a trusted source, they could alter DNS records for any domain and run adversary-in-the-middle (AiTM) operations, not just for websites, but for the domain names of critical applications and services.<\/p>\n<p>We cannot emphasize this enough: the DNS resolver is in a position of power.<\/p>\n<h3>Shadow DNS Network<\/h3>\n<p>The threat actor compromises routers, particularly older models, and changes the DNS settings on them. Every device using that router will unwittingly use the shadow DNS network.<\/p>\n<p>One user described their experience in early 2025 in a <a href=\"https:\/\/web.archive.org\/web\/20250228110159\/https:\/www.reddit.com\/r\/techsupport\/comments\/1isb8ah\/help_im_going_insane\/\" target=\"_blank\"><strong>Reddit post<\/strong><\/a> titled \u201cHELP im going insane\u201d [sic].  In a now-deleted response, another user describes their own experience, which hints that the exploitation goes beyond the router exploitation that we verified; see Figure 2. This threat is deceiving and will lead to the assumption that a problem exists in other services: online users complained that they could <a href=\"https:\/\/support.google.com\/chrome\/thread\/383955694\/i-m-unable-to-reach-this-site-please-fix-it-wanted-to-excess-google-sheet-through-this?hl=en\" target=\"_blank\"><strong>not access Google Sheets<\/strong><\/a> or that they were regularly redirected when <a href=\"https:\/\/support.google.com\/chrome\/thread\/400028964\/erro-url-desconhecida\" target=\"_blank\"><strong>using Google Chrome<\/strong><\/a>. These user reports indicate that the threat actor has manipulated DNS in some cases where we would expect the encrypted DNS-over-HTTPS (DoH) to be used and the router-set DNS server to be ignored. It\u2019s possible that in these cases, the user has turned off the secure DNS option or there is another underlying compromise on the device; we don\u2019t know.<\/p>\n<pre style=\"margin-left:0px\">This happened to me - I use OpenMTCPRouter (virtual router instead of a physical one, based on OpenWrT), with a public (virtual private server) VPS for aggregating network connections, I had misconfigured network rules, which exposed my \"router\" virtual machine to the internet, which was exposed publicly via my public VPS, which when compromised, had several things done:  \r\n- did DNS redirection to https:\/\/gettranslate[.]ir:18443 and profitablecpmrate.com.  \r\n- Locked out the root\/admin user  \r\n- Loaded a crypto miner <\/pre>\n<p class=\"image-caption\">Figure 2. A Reddit response to a user post about being unable to use their home network without interference; this <a href=\"https:\/\/www.reddit.com\/r\/techsupport\/comments\/1isb8ah\/help_im_going_insane\/\" target=\"_blank\"><strong>response and the original question<\/strong><\/a> are now deleted but were online in November 2025. <\/p>\n<p>There are dozens of recursive resolvers in the shadow Aeza network. Each compromised router is assigned a pair of them for DNS resolution. Answers to queries contain a time-to-live (TTL) of 20 seconds, forcing the devices to regularly connect to the Aeza resolver and ensuring that malicious redirects are difficult to replicate.<\/p>\n<p>The threat actor modifies responses based on the domain name requested, the router\u2019s location, time between queries from the router, and randomization. Extremely popular domains such as Google or Facebook are, in our experience, usually answered truthfully. Others that are still popular or related to critical services may be modified. For example, we have seen altered responses for domains like shopify[.]com and okta[.]com. The resolvers will also answer queries for non-existent domains, which are often seen because of typos or as leaks from devices on a network for local domains.<\/p>\n<p>Answers from the resolvers change based on several factors, and the correct IP address is frequently returned so that malicious redirects are limited and unpredictable. If any of the resolvers are queried \u201ctoo often\u201d in a short period of time, they will return 255.255.255.255 to the query. The reason for this response in lieu of the correct resolution is unclear to us.<\/p>\n<p>The DNS portion of the TDS uses a surprising trick to hide from security testing: it only answers DNS queries with a specific format. For example, if you query one of the name servers, e.g., 89.208.105.113, for the IP address of shopify[.]com, under most conditions you will get an error:<\/p>\n<p style=\"text-align:center\">;; Warning: Message parser reports malformed message packet.<\/p>\n<p>This stumped us for months. We knew that the queries were resolving for some devices but couldn\u2019t trigger a response ourselves. Persistent tinkering led to a solution! If we sent a query without the Extension Mechanisms for DNS (EDNS0) included, voila! The name server replied.<\/p>\n<p>This restriction by the threat actor is surprising because EDNS0 was introduced over a decade ago and is part of a standard DNS implementation. As a protocol extension, EDNS0 can serve a variety of purposes, including increasing the accepted size of a response, supporting DNSSEC, and providing hints about the client device location. Because most DNS resolvers enable EDNS0, queries to the Aeza hosts will usually result in a malformed response.<\/p>\n<p>Here is how to trigger a response from the command line:<\/p>\n<p style=\"text-align:center\">dig +noedns @89.208.105.113 shopify.com<\/p>\n<p>After building signatures, we found over three dozen resolvers for the system in early November 2025.  Some of those IP addresses include: 104[.]238[.]29[.]136, 138[.]124[.]101[.]153, 193[.]233[.]232[.]229, 45[.]80[.]228[.]233, 89[.]208[.]103[.]145. <\/p>\n<p>Thus far, we have only triggered a response by disabling EDNS0, but we suspect there is more to be learned. The number of routers that don\u2019t use EDNS0 is dwindling and would seem to limit their operation. Additionally, from one of our research partners, we know that the threat actor is broadly and regularly searching for new routers to attack. So, why keep this restriction? But\u2026.<\/p>\n<p>Getting the DNS resolvers to respond is only the first piece of this puzzle\u2026. <\/p>\n<h3>The HTTP TDS<\/h3>\n<p>When a user\u2019s browser connects to the altered IP address, e.g., 147.45.69.3, the device is fingerprinted and then directed to the next stage of the TDS if it passes the initial checks. This IP address serves as a proxy for the HTTP TDS, see Figure 3 for the host posture. Upon connection, a JavaScript file is returned that includes additional DNS queries which ensure that the connecting device is behind a compromised router. This is accomplished by including a URL with a domain name that should not resolve, e.g., gettranslate[.]ir. If the domain does not resolve, the script will redirect the user to www[.]google[.]com.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-figure3.jpg\" alt=\"Figure 3\" \/><\/p>\n<p class=\"image-caption\">Figure 3. Host posture of TDS proxy (147.45.69.3) returned by the shadow DNS servers as of January 21, 2026 <\/p>\n<p>The script we analyzed contained seemingly old code, including URLs hosted on domains that were apparently never registered. See Figure 4. The purposes of the various functions re(), red(), redbo(), etc., are unknown. If the device is unable to resolve gettranslate[.]ir and connect on port 18443, it will do a refresh and load Google\u2019s primary landing page. We have uncovered other versions of the scripts which use a different .ir domain.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-figure4.jpg\" alt=\"Figure 4\" \/><\/p>\n<p class=\"image-caption\">Figure 4. Malicious script received in November 2025 through the Aeza TDS showing historical code using links on unregistered domains; the current function redbool() will attempt to connect to gettranslate[.]ir on port 18443.<\/p>\n<p>If the first connection is successful, the device will be redirected again to another affiliate marketing platform link. From the URL<\/p>\n<ul>\n<li>http:\/\/gettranslate[.]ir:18443\/baner?sig=ded8deb7ff580788cc58cbbf5508f3bf&#038;BanerId=347333<\/li>\n<\/ul>\n<p>we were redirected to an adtech TDS that we track via<\/p>\n<ul>\n<li>www.effectivegatecpm[.]com\/bag4ni13i?key=cef13d2e5a9d1e200a50a6b3834cc7a9<\/li>\n<\/ul>\n<p>From there, our traffic was resold and eventually we were shown various advertisements. But with all these checks in place to ensure the traffic is coming from the compromised routers, our browser would frequently end up at the requested site or redirected to Google.<\/p>\n<p>We have found instances where directly visiting the TDS IP address resulted in an immediate redirection to a smartlink. For example, in the past, connecting to 89.208.107.49:8081 redirected to a smartlink using jackpotshop[.]life hosted in AS6898.<\/p>\n<p>For reasons that are unclear, <a href=\"https:\/\/archive.ph\/IEnkm\" target=\"_blank\"><strong>portions of the script<\/strong><\/a> were injected into comments in online forums, as well.<\/p>\n<h3>Impacts<\/h3>\n<p>In our research, the TDS always forced the browser into one of the two adtech platforms. But it is possible the threat actor is doing more with this system; the Reddit thread we uncovered indicated that bitcoin miners were installed and the admin was locked out. <\/p>\n<p>While not overly sophisticated, the design of this TDS is clever and has a reasonable amount of infrastructure to maintain just to deliver unwanted advertising. And it\u2019s clearly worked\u2014this actor has operated undetected for years. <\/p>\n<p>The Aeza shadow TDS we discovered harkens back to the days of <a href=\"https:\/\/en.wikipedia.org\/wiki\/DNSChanger\" target=\"_blank\"><strong>DNSChanger malware<\/strong><\/a>, which was the work of an Estonian company. Distributed as software necessary to view videos on websites, the malware changed DNS configurations and served advertising content from the company. The FBI seized the C2 servers and indicted key figures in 2011.<\/p>\n<p>Controlling DNS resolution is extremely powerful and goes well beyond the ability to deliver ads to a user. For example, a threat actor can selectively answer queries for critical services that are not protected by SSL certificates, or they can deny access to resources. The DNSChanger malware prevented antivirus updates on infected machines as a means of persistence.<\/p>\n<p>More recently, <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks\/\" target=\"_blank\"><strong>ESET Research published findings<\/strong><\/a> on a Chinese actor who had tampered with DNS resolver settings and targeted software updates. The ability to determine when software is updated and to deliver modified updates can allow lateral movement within a network. Beyond these examples, DNS is used to discover services, check systems, establish trust, and connect to resources for every aspect of internet communication.<\/p>\n<p>Overlay networks like this one can also impact DNS research because the false records get absorbed into some databases. There are many commercial sources for passive DNS available and some of these rely on \u201cport 53\u201d collection. In these cases, responses from authoritative name servers within the global DNS are mixed with the responses from alternate resolvers like the ones we\u2019ve described here. If researchers aren\u2019t aware of the type of DNS data they are using, they can draw false conclusions.  <\/p>\n<p>In our case, a third-party \u201cport 53\u201d collection helped us recognize this overlay network. There were <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/kimwolf-howls-from-inside-the-enterprise\/\" target=\"_blank\"><strong>Kimwolf botnet<\/strong><\/a> domains in that database, which resolved incorrectly to 89[.]208[.]107[.]49, an IP address we had already been monitoring for a few years. Independently, we had been \u201cnoodling\u201d over mysterious DNS resolutions for domains like gettranslate[.]ir. Suddenly, we were able to put these two puzzles together and once we had the EDNS0 trick, the mystery quickly unraveled. How fun is that? <\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\nmargin-top:auto;\n}\n.list-spacing li{margin-bottom:20px}\n.img-container, .img-container-3-col {\ndisplay: flex;\n}\n.img-container img {\n    width: 40%;\n    margin-bottom: 10px;\n    height: max-content !important;\n}\n.img-container-3-col img {\nwidth: 30%;\nmargin-bottom: 10px;\n}\n@media (max-width: 767px) {\n.img-container, .img-container-3-col {\ndisplay: block;\n}\n.img-container img, .img-container-3-col img {\nwidth: 100%;\n}\n.grid-container {\n    grid-template-columns: 1fr!important;\n  }\n}\n@media (min-width: 767px) {\n.img-50{width:50%;}\n}\n.grid-container {\n  display: grid;\n  grid-template-columns: repeat(2, 1fr);\n  gap: 40px;\n  max-width: 800px;\n  margin: 0 auto;\n  align-items: stretch;\n}\n.grid-item {\n   display: flex;\n  flex-direction: column;\n  justify-content: flex-start;\n}\n.grid-item img {\n  width: 100%;\n  height: auto;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Compromised Routers, DNS, and a TDS<\/span> Hidden in Aeza Networks');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When most people say DNS, they are thinking about the global DNS system, the official mechanism for resolving domain names on the internet. But shadow systems exist. Visiting a website relies on a DNS resolution chain that iteratively queries authoritative name servers within the distributed DNS hierarchy to get an IP address. This resolution all [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":12872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[1531,1141,1082,1532,902,40,1523,1320,1533],"class_list":{"0":"post-12861","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-compromised-routers-dns","9":"tag-botnet","10":"tag-traffic-distribution-system","11":"tag-adtech-redirects","12":"tag-tds","13":"tag-threat-intelligence","14":"tag-affiliate-advertising","15":"tag-dns-malware","16":"tag-dns-hijack","17":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Compromised Routers, DNS, and a TDS Hidden in Aeza Networks<\/title>\n<meta name=\"description\" content=\"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks\" \/>\n<meta property=\"og:description\" content=\"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-03T15:55:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-03T16:33:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks\" \/>\n<meta name=\"twitter:description\" content=\"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks\",\"datePublished\":\"2026-02-03T15:55:59+00:00\",\"dateModified\":\"2026-02-03T16:33:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/\"},\"wordCount\":1922,\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg\",\"keywords\":[\"compromised routers DNS\",\"botnet\",\"Traffic Distribution System\",\"adtech redirects\",\"TDS\",\"Threat Intelligence\",\"affiliate advertising\",\"DNS malware\",\"DNS hijack\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/\",\"url\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/\",\"name\":\"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg\",\"datePublished\":\"2026-02-03T15:55:59+00:00\",\"dateModified\":\"2026-02-03T16:33:04+00:00\",\"description\":\"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage\",\"url\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg\",\"contentUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.infoblox.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"name\":\"blog.infoblox.com\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks","description":"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/","og_locale":"en_US","og_type":"article","og_title":"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks","og_description":"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/","og_site_name":"Infoblox Blog","article_published_time":"2026-02-03T15:55:59+00:00","article_modified_time":"2026-02-03T16:33:04+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks","twitter_description":"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks","datePublished":"2026-02-03T15:55:59+00:00","dateModified":"2026-02-03T16:33:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/"},"wordCount":1922,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg","keywords":["compromised routers DNS","botnet","Traffic Distribution System","adtech redirects","TDS","Threat Intelligence","affiliate advertising","DNS malware","DNS hijack"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/","name":"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg","datePublished":"2026-02-03T15:55:59+00:00","dateModified":"2026-02-03T16:33:04+00:00","description":"Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Compromised Routers, DNS, and a TDS Hidden in Aeza Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"blog.infoblox.com","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12861"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12861\/revisions"}],"predecessor-version":[{"id":12874,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12861\/revisions\/12874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12872"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}