{"id":10516,"date":"2024-08-12T07:55:06","date_gmt":"2024-08-12T14:55:06","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10516"},"modified":"2024-08-12T08:10:36","modified_gmt":"2024-08-12T15:10:36","slug":"from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/","title":{"rendered":"From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems"},"content":{"rendered":"<p>Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organizations for years: they have been largely ignored and thought of as simply advertising networks or \u201cadware\u201d, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains that direct victims to scams, phishing, and malware. The size and complexity of these TDSs are hidden behind a constantly changing labyrinth of domains and defense measures that frustrate even the most experienced security researchers. A TDS can be difficult to recognize because many domains are just redirects and because it does not deliver malicious content to every user. Fortunately, information found in DNS can be used to pull back the curtain and shine a light on these networks. Moreover, DNS offers the most powerful control point to prevent compromise that occurs from malicious content delivered via a TDS.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg\" alt=\"\" class=\"aligncenter size-full wp-image-10519\" style=\"width: 60%;\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image-300x300.jpeg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image-150x150.jpeg 150w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image-768x768.jpeg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image-75x75.jpeg 75w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h3>What are Traffic Distribution Systems (TDSs)?<\/h3>\n<p>If you have clicked on a link in an email or on an ad in social, you have probably encountered a traffic distribution system, also known as a traffic delivery system. You may not realize it, but that link didn\u2019t take you directly to the web page you wanted to visit. Somewhere along the path to your desired destination, a server gathered information about you and the link you originally clicked, before the server sent you on your way. It collected this data to provide to your favorite store, whose marketing department wants to know which of their marketing campaigns works best. Should they continue to send emails to potential customers or just focus on those social media ads? <\/p>\n<p>TDSs were first developed to help marketers manage incoming traffic from various sources. They needed a systematic way of tracking how visitors were getting to their site and TDSs provide that capability. TDSs can even use information they gather about their visitors to direct them to different content. Are people that click on email links about sales or discounts more cost conscious? If so, marketers will direct them to a page that emphasizes affordability, while other visitors are sent to a page that emphasizes ease of use&#8230;and so on. <\/p>\n<p>One of the main purposes for which marketers use TDSs is to ascertain and keep track of who, or what, was behind each \u201cclick.\u201d A TDS can track which options for directing traffic to their site (social media ads, emails, third-party affiliates that refer their audiences, etc.) are most effective (Figure 1). This tracking data is used both to inform future decisions and determine how much these affiliates should be compensated. Since affiliates are known to sometimes use bots to artificially increase their referrals, TDSs can also be used to determine who, or what, is behind the click.<\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td style=\"padding: 0px;\">\n<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"800\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-1.png\" alt=\"\" class=\"aligncenter size-full wp-image-10520\" style=\"width: 50%;\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-1.png 640w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-1-240x300.png 240w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>\n  <\/td>\n<\/tr>\n<tr>\n<td>Figure 1 \u2013 Traffic distribution systems (TDSs) are often used to track the source of incoming traffic <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Marketers also frequently use TDSs when they perform A\/B testing (Figure 2). For example, when a marketer wants to test a new web design, they could use a TDS to send half their visitors to the new version of the site and the other half to the current version. Marketers can then analyze how visitor behavior is different between the two versions, thereby evaluating the new design. If it works well, they can then use the TDS to just send all the traffic to the new version. <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td style=\"padding: 0px;\">\n<img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"804\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-2.png\" alt=\"\" class=\"aligncenter size-full wp-image-10521\" style=\"width: 40%;\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-2.png 480w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-2-179x300.png 179w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/>\n  <\/td>\n<\/tr>\n<tr>\n<td>Figure 2 \u2013 TDSs can be used to evaluate the performance of different content on a website, known as A\/B testing <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>While these features have made TDSs an essential tool for marketers, they have proven to be equally effective for cybercriminals.<\/p>\n<h3>Malicious TDSs<\/h3>\n<p>A TDS offers an infrastructure that is highly resistant and adaptive, and can withstand standard security defense approaches. Victims get pulled into a TDS in a variety of ways: from clicking on a fake search result to being hijacked by a malicious ad. Regardless of how they got there, once they are in, they are merely along for the ride. They have as much control as a pinball in a pinball machine. Most of the time, victims are sent to a malicious site that specifically targets visitors meeting certain criteria. Other times, they are simply sent to a site that generates ad revenue. In some cases, potential victims are kicked out of the TDS entirely and sent to legitimate sites like Google. Not only does this variety of destinations reduce the perceived risk of these \u201cadvertising networks,\u201d but it also hinders security researchers investigating the TDS (see Figure 3).<\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td style=\"padding: 0px;\">\n<img loading=\"lazy\" decoding=\"async\" width=\"1120\" height=\"1120\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-3.png\" alt=\"\" class=\"aligncenter size-full wp-image-10522\" style=\"width: 60%;\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-3.png 1120w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-3-300x300.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-3-1024x1024.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-3-150x150.png 150w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-3-768x768.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-3-75x75.png 75w\" sizes=\"auto, (max-width: 1120px) 100vw, 1120px\" \/>\n  <\/td>\n<\/tr>\n<tr>\n<td>Figure 3 \u2013 Threat actors have built massive TDSs that direct victims through a maze of domains delivering content that is malicious, that provides ad revenue, or that sometimes is legitimate and set to throw off researchers<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Cybercriminals that operate TDSs don\u2019t always use them just for their own campaigns. They frequently act as a service provider and provide access to the network, and its victims, to affiliates that are operating their own campaigns. All for a fee, of course. In marketing, TDSs are specifically designed to gather as much information about the visitor as possible. In the world of cybercrime, threat actors that operate large TDS networks offer their affiliates the ability to target a very specific set of victims. For example, an affiliate could use a TDS to target victims using a specific Safari browser version on an iPhone with a phishing campaign that looks just like native system notifications. Another affiliate could target Windows users that are using an outdated browser version with a malware exploit tailored to a specific vulnerability found on that version. One of the most important benefits for threat actors, however, is the ability to identify bots or security researchers and direct them out of the network, making traditional methods for mapping the infrastructure a challenge.<\/p>\n<h3>Varieties of TDSs<\/h3>\n<p>Although TDSs often use HTTP redirects, there are other ways to direct traffic, enabling cybercriminals to hide what they are doing from victims and researchers alike. To date, we have observed three different types of TDS implementations.<\/p>\n<h3>HTTP-based<\/h3>\n<p>In HTTP-based systems, the web server receives the request, analyzes the client making the request, and then redirects the client to the next destination using an HTTP redirect code such as 301 or 302. This traditional version may not be as stealthy as the other versions of TDSs, but it does give the owner the opportunity to get as much information from the client as possible. It has full access to data in the HTTP request itself and can even use JavaScript to get information about the client machine. This information is necessary for cybercriminals who want to direct victims to specific destinations. For example, a website hosting Microsoft Windows malware won\u2019t be effective if the visitor is using the Safari browser on their iPhone. At Infoblox, we use the designation Viper for certain threat actors that use this type of TDS. <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/vigorish-viper\/\" rel=\"noopener\" target=\"_blank\">Vigorish Viper<\/a> and <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/vextrio\/\" rel=\"noopener\" target=\"_blank\">Vextrio Viper<\/a> are two recent examples.<\/p>\n<h3>Link Shortener<\/h3>\n<p>While link shorteners have legitimate uses, cybercriminals use them to hide the intended destinations of links. Some cybercriminals abuse well-known link shortening services to give their links the appearance of legitimacy. We have also observed that some cybercriminals operate custom systems that create shortened links for large TDSs. Since the links are short, less victim information can be embedded in the link than with HTTP-based TDSs. However, the benefit for cybercriminals is that internet users are accustomed to seeing shortened links and may be more likely to click on them. At Infoblox, we use the designation Puma for threat actors that use this type of TDS. <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/prolific-puma\/\" rel=\"noopener\" target=\"_blank\">Prolific Puma<\/a> is a recent example. <\/p>\n<h3>DNS CNAME-based<\/h3>\n<p>The last type of TDS we will discuss here directs traffic using DNS CNAME records. Since this redirection happens at the DNS level, it does a far better job of hiding from victims and researchers than the previous types of TDSs, which operate at the level of HTTP requests. The downside of this approach, however, is that it doesn\u2019t provide access to as much information about the victim. The threat actor only has access to the victim\u2019s IP address from the DNS request. Granted, things like the victim\u2019s location can be inferred from the IP address, but it isn\u2019t close to the information that can be obtained from JavaScript running on the victim\u2019s machine. At Infoblox, we use the designation Seahorse to identify threat actors that use this type of TDS. <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/savvy-seahorse\/\" rel=\"noopener\" target=\"_blank\">Savvy Seahorse<\/a> is a recent example. <\/p>\n<h3>Stopping a Malicious TDS<\/h3>\n<p>Given the obfuscation and apparent randomness inherent to malicious TDSs, the traditional approach of simply blocking a domain with crypto scam content or a malware download isn\u2019t broadly effective. Threat actors can easily update their TDS to direct traffic to one of the other hundred domains with the same content or change the content to evade scanning solutions (see Figure 4). Furthermore, since the designers of malicious TDSs aggressively work to prevent researchers and analysts from interacting with them, the techniques normally used to map such networks are often unsuccessful. <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td style=\"padding: 0px;\">\n<img loading=\"lazy\" decoding=\"async\" width=\"1120\" height=\"1120\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-4.png\" alt=\"\" class=\"aligncenter size-full wp-image-10523\" style=\"width: 60%;\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-4.png 1120w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-4-300x300.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-4-1024x1024.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-4-150x150.png 150w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-4-768x768.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-4-75x75.png 75w\" sizes=\"auto, (max-width: 1120px) 100vw, 1120px\" \/>\n  <\/td>\n<\/tr>\n<tr>\n<td>Figure 4 \u2013 Blocking individual destination domains with malicious content isn\u2019t that effective in protecting against a TDS since the operator can simply direct the victim along a different path to a different destination domain<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Fortunately, DNS offers researchers the ability to sidestep many of these attempts to hinder the discovery and tracking of large TDS networks. DNS traffic can be used to identify the sequence of requests made as a victim is directed through the TDS and to find common configurations that aren\u2019t visible in normal web traffic. All of this can be combined to create a picture of the TDS infrastructure as a whole. Given that many of these TDSs use tens of thousands of domains (some more than 100,000), most researchers are bound to miss portions of the infrastructure. However, if enough of the infrastructure is blocked, then the TDS will cease to be effective (see Figure 5). Furthermore, with an understanding of a TDS\u2019s infrastructure, a researcher can see the threat actor\u2019s attempts to rebuild and block new domains before they pose a threat. <\/p>\n<table style=\"margin: 0 auto 30px\">\n<tbody>\n<tr>\n<td style=\"padding: 0px;\">\n<img loading=\"lazy\" decoding=\"async\" width=\"1120\" height=\"1120\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-5.png\" alt=\"\" class=\"aligncenter size-full wp-image-10524\" style=\"width: 60%;\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-5.png 1120w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-5-300x300.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-5-1024x1024.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-5-150x150.png 150w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-5-768x768.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-figure-5-75x75.png 75w\" sizes=\"auto, (max-width: 1120px) 100vw, 1120px\" \/>\n  <\/td>\n<\/tr>\n<tr>\n<td>Figure 5 \u2013 If enough of a TDS\u2019s infrastructure is blocked, there aren\u2019t enough domains left to direct traffic to the desired destinations<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Wrap-up<\/h3>\n<p>By collectively overlooking malicious TDSs over the years, the cybersecurity community has allowed them to flourish. With more visibility on the risks that malicious TDSs pose, the community has started to look for effective ways to protect against them. Infoblox Threat Intel\u2019s expertise in DNS has proven to be essential in making sense of the massive networks of domains and redirects that threat actors have built. These TDSs comprise some of the largest sets of cybercrime infrastructure yet observed.<\/p>\n<style>\n.green {color: #00bd4d;}\n.code-format {\n    font-family: 'Courier New';\n}\ntable{\nfont-size: 16px;\nword-break: keep-all;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">From Click to Chaos:<\/span> Bouncing Around in Malicious Traffic Distribution Systems');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organizations for years: they have been largely ignored and thought of as simply advertising networks or \u201cadware\u201d, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains that direct victims [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":10519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[893,30,902,1082,915,40],"class_list":{"0":"post-10516","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-domain-name-system","9":"tag-dns","10":"tag-tds","11":"tag-traffic-distribution-system","12":"tag-rdga","13":"tag-threat-intelligence","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox<\/title>\n<meta name=\"description\" content=\"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-12T14:55:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T15:10:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems\",\"datePublished\":\"2024-08-12T14:55:06+00:00\",\"dateModified\":\"2024-08-12T15:10:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/\"},\"wordCount\":1804,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg\",\"keywords\":[\"Domain Name System\",\"DNS\",\"TDS\",\"Traffic Distribution System\",\"RDGA\",\"Threat Intelligence\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/\",\"name\":\"Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg\",\"datePublished\":\"2024-08-12T14:55:06+00:00\",\"dateModified\":\"2024-08-12T15:10:36+00:00\",\"description\":\"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox","description":"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/","og_locale":"en_US","og_type":"article","og_title":"Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox","og_description":"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/","og_site_name":"Infoblox Blog","article_published_time":"2024-08-12T14:55:06+00:00","article_modified_time":"2024-08-12T15:10:36+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox","twitter_description":"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems","datePublished":"2024-08-12T14:55:06+00:00","dateModified":"2024-08-12T15:10:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/"},"wordCount":1804,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg","keywords":["Domain Name System","DNS","TDS","Traffic Distribution System","RDGA","Threat Intelligence"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/","name":"Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg","datePublished":"2024-08-12T14:55:06+00:00","dateModified":"2024-08-12T15:10:36+00:00","description":"Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems-header-image.jpeg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10516"}],"version-history":[{"count":10,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10516\/revisions"}],"predecessor-version":[{"id":10537,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10516\/revisions\/10537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/10519"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}