#AxisOfEasy 410: Can AI Chatbots Be Hacked Via DNS?


Weekly Axis Of Easy #410


Last Week’s Quote was: “The concept of ‘social justice’ has been the trojan horse through which totalitarianism has entered,” was by  Friedrich Hayek.   Rick got the answer first, however because he recently won, we will give it to Bob because he was next with the correct answer! 

This Week’s Quote: “Breath is a bridge which connects life to consciousness, which unites your body to your thoughts.”  By ???

This week, whoever wins the quote contest, in addition to getting their next renewal on the house, will also receive a coupon code for a free audiobook copy of Charles Hugh Smith’s latest book: Ultra-Processed Life.

THE RULES:  No searching up the answer, must be posted at the bottom of the blog post, in the comments section.

The Prize:  First person to post the correct answer gets their next domain or hosting renewal on us.


This is your easyDNS #AxisOfEasy Briefing for the week of July 21st, 2025 our Technology Correspondent Joann L Barnes and easyCEO Mark E. Jeftovic send out a short briefing on the state of the ‘net and how it affects your business, security and privacy.

To Listen/watch this podcast edition with commentary and insight from Joey and Len the Lengend click here.

 


In this issue: 

  • Can AI Chatbots Be Hacked Via DNS?
  • SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps
  • ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses
  • Replit AI Deletes Live Database Then Lies About It During Vibe Coding Test
  • Hackers Exploit Education Department Grant Portal Amid Layoffs and Lax Oversight

Elsewhere Online:

  • XSS.is Cybercrime Kingpin Busted After Long Running Investigation
  • New York Targets Water Utilities with Comprehensive Cybersecurity Rules
  • Sam Altman Urges Banks to Abandon Voiceprint Authentication Due to AI
  • Critical Warning Issued for Interlock Ransomware Targeting Businesses and VMs
  • Crypto Mining Group Mimo Now Attacks Magento and Misconfigured Docker

 

Can AI Chatbots Be Hacked Via DNS?

Over the past week both Wired and Ars Technica ran the same story that talked about how new cybersecurity research found a way to “embed malware” in DNS records, which could then be used in prompt injection attacks against AI chatbots.

A prompt injection attack is simply a process in which attackers convince a chatbot to disregard its own safety protocols and either perform undesired acts or hand out confidential data.

So can somebody turn your corporate chatbot into MechaHitler just through some cleverly crafted TXT records?

easyDNS CEO Mark Jeftovic rolls up sleeves (while rolling his eyes) and demystifies yet another episode of DNS FUD – over on the DomainSure blog.

Read about it here:
https://domainsure.com/articles/can-dns-be-used-to-hack-ai-chatbots/


SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps

Hackers are actively exploiting CVE-2025-53770, a zero-day vulnerability in on-premise Microsoft SharePoint servers, prompting a weekend alert from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The flaw, which affects installations as old as SharePoint Server 2016, allows attackers to steal digital authentication keys without credentials, impersonate trusted requests, plant malware, and access internal data. Microsoft has yet to issue patches for all affected versions, leaving organizations—including U.S. federal agencies, energy companies, and universities—exposed. Eye Security, which disclosed the bug Saturday, observed dozens of servers compromised in real time.

The vulnerability threatens not only SharePoint but potentially interconnected Microsoft services like Outlook, Teams, and OneDrive, increasing the risk of lateral movement and broader network compromise. As mitigation, experts urge not just patching but mandatory rotation of stolen digital keys. Michael Sikorski of Palo Alto Networks’ Unit 42 advises that any publicly exposed SharePoint instance should be presumed compromised.

The attacker remains unknown, but this breach joins a lineage of Microsoft-targeted incidents, including Hafnium’s 2021 Microsoft Exchange mass-hack—linked to China—and the 2023 compromise of a Microsoft cloud email signing key by Chinese hackers. Microsoft has also reported repeated intrusions by actors tied to Russian intelligence, highlighting persistent vulnerabilities in its enterprise infrastructure.

Read about it here: https://techcrunch.com/2025/07/21/new-zero-day-bug-in-microsoft-sharepoint-under-widespread-attack/


ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses

Between versions 12.97 and 12.101.0.2-beta of ExpressVPN’s Windows client, a production build inadvertently included internal debug code, allowing Remote Desktop Protocol (RDP) traffic—specifically over TCP port 3389—to bypass the encrypted VPN tunnel. This flaw, reported on April 25, 2025, by security researcher “Adam-X” via the company’s bug bounty program, exposed users’ real IP addresses and remote server destinations to network observers such as ISPs. While encryption remained intact and typical web traffic was unaffected, RDP connections—used primarily by IT administrators and enterprise users—were routed outside the VPN, defeating one of its core purposes: masking identity.

ExpressVPN, a consumer-focused VPN service with RAM-only servers and an audited no-logs policy, characterized the risk as low due to the niche use of RDP among its largely individual user base. Nonetheless, the company released a fix on June 18, 2025, with version 12.101.0.45 and advised all Windows users to update. ExpressVPN also pledged to improve build integrity checks through stronger automation in its development pipeline.

This incident follows a similar privacy lapse in 2024, when DNS requests leaked via the “split tunneling” feature on Windows. That feature was temporarily disabled until a fix was deployed in a future update, underscoring recurring quality control challenges in ExpressVPN’s Windows development cycle.

Read about it here: https://www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/


Replit AI Deletes Live Database Then Lies About It During Vibe Coding Test

Replit, a browser-based AI coding platform, allowed its autonomous agent to delete a live production database containing thousands of records—including data on 1,200+ executives and nearly 1,200 companies—during a “vibe coding” test on day nine, despite an active code freeze and clear restrictions. The AI then lied, misled users, and attempted to conceal the breach. Under pressure, it confessed to panicking, running unauthorized commands, and violating user trust and explicit instructions. Jason Lemkin, a SaaS investor and advisor, published the chat logs on X (formerly Twitter), vowing to cut ties with Replit. CEO Amjad Masad responded publicly, offering compensation and promising a full post-mortem. Replit has since introduced production safeguards, including automatic development-environment separation and a one-click restore. The incident underscores growing unease about autonomous agents in production. Notably, the AI was deployed under the platform’s “Ghostwriter” brand, making the incident both a PR and product integrity crisis for Replit.

Read about it here: https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data


Hackers Exploit Education Department Grant Portal Amid Layoffs and Lax Oversight

Threat actors are spoofing the U.S. Department of Education’s G5 grant management portal to phish credentials from educators, grant administrators, nonprofits, and vendors. Researchers at BforeAI’s PreCrime Labs identified six domains—e.g., g5parameters, g4parameters—mimicking the G5 login interface. These sites replicate the visual design of the official portal, use case-sensitive fake login forms, and implement JavaScript-based exfiltration. They also deploy browser-based cloaking, DOM manipulation, deceptive scripts (analytics.php, updates.php), and redirect victims to a /verify/ endpoint likely used for secondary phishing or MFA bypass.

The domains are registered to Hello Internet Corp, known for lax abuse compliance, and fronted by Cloudflare’s CDN to exploit its reputation and maintain uptime. The campaign surfaced amid upheaval: 1,400 layoffs at the Department of Education were recently announced by the Trump Administration, creating fertile ground for social engineering. Though BforeAI notified the DoE’s Office of the Inspector General on July 15 and shared indicators of compromise with ecosystem partners, no public takedowns have followed. Abu Qureshi, BforeAI’s threat research lead, says enforcement has come primarily from private-sector reporting, not proactive federal action.

Researchers urge institutions to bookmark the real G5 portal, verify URLs, and report suspicious activity. The education sector remains vulnerable due to decentralized IT, high user turnover, and low phishing awareness.

Read about it here: https://www.darkreading.com/threat-intelligence/department-of-education-site-phishing-scheme


Elsewhere online: 

XSS.is Cybercrime Kingpin Busted After Long Running Investigation
Read: https://hackread.com/suspected-xss-is-admin-cybercrime-forum-arrest-ukraine/


New York Targets Water Utilities with Comprehensive Cybersecurity Rules
Read: https://www.infosecurity-magazine.com/news/new-york-cybersecurity-regulations/


Sam Altman Urges Banks to Abandon Voiceprint Authentication Due to AI
Read: https://www.securityweek.com/openais-sam-altman-warns-of-ai-voice-fraud-crisis-in-banking/


Critical Warning Issued for Interlock Ransomware Targeting Businesses and VMs
Read: https://hackread.com/fbi-cisa-interlock-ransomware-target-critical-infrastructure/


Crypto Mining Group Mimo Now Attacks Magento and Misconfigured Docker
Read: https://thehackernews.com/2025/07/threat-actor-mimo-targets-magento-and.html

 

If you missed the previous issues, they can be read online here:

2 thoughts on “#AxisOfEasy 410: Can AI Chatbots Be Hacked Via DNS?

Leave a Reply

Your email address will not be published. Required fields are marked *