[rwth-security] Hackers use DNS tunneling for network scanning, tracking victims