{"id":10762,"date":"2024-10-23T11:55:38","date_gmt":"2024-10-23T18:55:38","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10762"},"modified":"2024-10-23T07:07:51","modified_gmt":"2024-10-23T14:07:51","slug":"threat-actors-abuse-dns-to-con-consumers","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/","title":{"rendered":"Threat Actors Abuse DNS to Con Consumers"},"content":{"rendered":"<h3>DNS provides a premier cybercrime route<\/h3>\n<p>According to <a href=\"https:\/\/www.cisa.gov\/shields-guidance-families#:~:text=Think%20before%20you%20click,numbers%2C%20or%20other%20sensitive%20information.\" rel=\"noopener\" target=\"_blank\">CISA<\/a>, more than 90% of successful cyber-attacks start with a link or webpage designed by bad actors to trick users into revealing their passwords or other sensitive information. To make these phishing attacks possible, DNS forms an ideal tool for adversaries. A legitimate-looking domain name, with a link (i.e., the IP address) to a host holding the malicious payload, provides bait and hook. While this threat scenario is one of the most popular tactics within the cybercrime ecosystem there is much more to it. DNS infrastructure and communications fit perfectly to the criminal mode of operation. In this blog we\u2019ll dive deeper into how adversaries look at DNS, some recently discovered DNS-enabled attacks and how to stop them.<\/p>\n<h3>How actors operate: anonymous, intentional, stealthy, and opportunistic<\/h3>\n<p>The first element DNS offers to cybercriminals is anonymity. Very few security vendors track newly registered domains and the content behind them. This lack of DNS oversight gives cybercriminals a form of anonymity. It enables them to set up a nefarious infrastructure including the content bait, malicious payload, and victim data-capturing backend. Once setup, the actor can sit back, see how targets take the bait and harvest victim data while staying unidentifiable. <\/p>\n<p>A second advantage adversaries find in DNS is the ability to intentionally target and aim at victims. Domain names can attract a specific group of interest, especially when associated with a trusted brand name or an abbreviated use case (e.g., shop-olympics.shop). However, there is much more that DNS offers. By combining multiple DNS servers, domain names can lure and redirect traffic to the right malicious content based on the victim\u2019s environment. Just like advertisers, threat actors have developed ways to redirect users based on their originating region, browser in use, operating system, and much more. The goal behind the reader redirections is to target the most vulnerable audience while maximizing the ROI of their operation. <\/p>\n<p>One of the most interesting adversarial advantages of DNS is, of course, stealth. The traffic redirection mentioned above not only enables finding the right target but also helps in keeping security scanners and detections away. Stealth can also be achieved within the DNS communication between clients and domain servers. When a client (PC or mobile device) sends a DNS request, the response can hold \u201cspecial commands\u201d for applications running on the client machine. This method is often used for Command and Control (C2) of malware, active on the client machine. Most importantly, by hiding commands in the DNS response, the C2 communication stays undetected by many security tools, allowing the adversary to continue their attack. <\/p>\n<p>Finally, DNS allows actors to continue the path of least resistance and remain opportunistic when crafting an attack. DNS is a ubiquitous technology, mandatory when applications or devices connect over the network. As a result, it can be used in multiple cybercrime scenarios or attack steps. Tactics like social engineering (e.g., look-alike sites), credential theft (i.e., phishing links), unauthorized remote access, or data leakage can be facilitated by abusing DNS infrastructure or communications. In simple terms, DNS is the Swiss army knife for any actor and supports a broad spectrum of intrusion techniques.   <\/p>\n<h3>Recently Infoblox discovered DNS weaponizations:<\/h3>\n<p>At Infoblox we are focused on discovering all ways threat actors are abusing DNS to conceal their criminal operations. Over the past year our team of experts discovered multiple DNS weaponizations. Here a brief overview:  <\/p>\n<ul class=\"list-spacing\">\n<li><a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/beware-the-shallow-waters-savvy-seahorse-lures-victims-to-fake-investment-platforms-through-facebook-ads\/\" rel=\"noopener\" target=\"_blank\">ACTOR \u201cSAVVY SEAHORSE\u201d LURES VICTIMS TO FAKE INVESTMENT PLATFORMS<\/a><br \/>\nSavvy Seahorse is a DNS threat actor who tricks victims into creating accounts on fake investment platforms. Victims are persuaded to deposit money into personal accounts, which are then transferred to a bank in Russia. This actor uses Facebook ads to lure users to their fake websites.<br \/>\nSavvy Seahorse\u2019s campaigns are sophisticated, using advanced techniques like fake messages via SMS to convince users to enter personal information for supposed high-return investments. They exploit the Domain Name System (DNS) to control access to malicious content and dynamically update IP addresses, helping them evade detection by the security industry. <\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/gambling-is-no-game-dns-links-between-chinese-organized-crime-and-sports-sponsorships\/\" rel=\"noopener\" target=\"_blank\">Chinese Organized Crime created DNS links to Sports Sponsorships<\/a>:<br \/>\nInfoblox has discovered an advanced technology suite connected to Chinese organized crime, money laundering, and human trafficking in Southeast Asia. This suite includes software, DNS configurations, website hosting, payment mechanisms, mobile apps, and more, forming a complete cybercrime supply chain.<br \/>\nNumerous unrelated gambling brands, which also sponsor European sports teams, use this technology. The brands exploit residents in China and victims worldwide tapping into the $1.7 trillion illegal gambling economy.<br \/>\nThe actor, known as \u201cVigorish Viper,\u201d has developed highly sophisticated software and infrastructure. They use multiple, layered traffic distribution systems (TDSs) and JavaScript to create protective gates, extensively fingerprinting users by monitoring mouse movements and evaluating IP addresses. The most advanced software versions are reserved for Chinese brands. Vigorish Viper controls over 170,000 domain names and operates a malicious infrastructure linked to Hong Kong and China. <\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/olympics-scammers-take-their-marks-get-set-and-go\/\" rel=\"noopener\" target=\"_blank\">Olympics Scammers Take Their Marks, Get Set, and Go!<\/a><br \/>\nAmong the many phishing and spear phishing lures related to the past summer games, ticket sale scams have been the most common. Fraudulent websites offering ticket sales, mobile recharge plans, and merchandise have been widespread leading up to the summer Olympic opening ceremonies.<br \/>\nHundreds of domains claim to offer discounted tickets to the Paris Olympics. These websites are sophisticated, user-friendly, and appear so legitimate that it\u2019s hard to distinguish them from real ones. Infoblox discovered over sixty domains with the same website title, aiming to gather victims\u2019 personal information in exchange for \u201cfree\u201d mobile service.<br \/>\nThese DNS enabled attacks can affect everyone and present risk to consumers simply browsing the internet or reading their email. Common in all the adversarial tactics is that the cyber-criminal first carefully created the domain and malicious site sometimes months to a year in advance of the attack.  <\/li>\n<\/ul>\n<h3>Outpace the adversary with DNS derived Threat Intelligence<\/h3>\n<p>Each time a cybercriminal sets up a domain they leave some information behind. Infoblox is one of the very few vendors to collect this information and detects user activity from when connecting to malicious domains. This telemetry in combination with decades of expertise in analyzing DNS usage results in highly valuable threat intelligence containing clues about imminent threats even those that have not reached victims yet. <\/p>\n<p>By actioning the DNS derived threat intelligence and stopping users from taking the bait, many of these DNS sourced attacks can be easily deflected. Infoblox provides security teams with threat intelligence and the controls in place to stop the attacker with minimal efforts.  Infoblox threat intelligence can also be seamlessly integrated into the security operations processes to investigate ongoing attacks to understand motivations and provide firm response. <\/p>\n<p>DNS can give the attacker an advantage by deceiving the victims and automatically providing a malicious link. It is effectively used by many cyber criminals and can be extremely dangerous. Infoblox generates threat intelligence to proactively stop these attacks and efficiently protect businesses from costly incidents. <\/p>\n<p>To learn more on how to protect brand and consumer trust using Infoblox threat intelligence go to <a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.infoblox.com\/threat-intel\/<\/a>  <\/p>\n<style>\n.savy-seahorse-table {\nfont-size:14px;\nword-break: keep-all;\n}\n.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {\npadding-right:10px;\n}\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{\npadding-bottom:20px;\n}<\/p>\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Threat Actors<\/span> Abuse DNS to Con Consumers');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS provides a premier cybercrime route According to CISA, more than 90% of successful cyber-attacks start with a link or webpage designed by bad actors to trick users into revealing their passwords or other sensitive information. To make these phishing attacks possible, DNS forms an ideal tool for adversaries. A legitimate-looking domain name, with a [&hellip;]<\/p>\n","protected":false},"author":407,"featured_media":10769,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[30,307,386,930,902],"class_list":{"0":"post-10762","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-dns","9":"tag-phishing","10":"tag-lookalike-domains","11":"tag-cybercrime","12":"tag-tds","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why cybercriminals like DNS | Infoblox<\/title>\n<meta name=\"description\" content=\"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why cybercriminals like DNS | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-23T18:55:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bart Lenaerts-Bergmans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Why cybercriminals like DNS | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bart Lenaerts-Bergmans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/\"},\"author\":{\"name\":\"Bart Lenaerts-Bergmans\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/641bd9fbad20df55272970414b97ada9\"},\"headline\":\"Threat Actors Abuse DNS to Con Consumers\",\"datePublished\":\"2024-10-23T18:55:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/\"},\"wordCount\":1194,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg\",\"keywords\":[\"DNS\",\"Phishing\",\"lookalike domains\",\"Cybercrime\",\"TDS\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/\",\"name\":\"Why cybercriminals like DNS | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg\",\"datePublished\":\"2024-10-23T18:55:38+00:00\",\"description\":\"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/threat-intelligence\\\/threat-actors-abuse-dns-to-con-consumers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat Actors Abuse DNS to Con Consumers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/641bd9fbad20df55272970414b97ada9\",\"name\":\"Bart Lenaerts-Bergmans\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"caption\":\"Bart Lenaerts-Bergmans\"},\"description\":\"Bart is a Senior Product Marketing Manager with over 20 years of experience in bringing security operations solutions to market. He started his career in the security industry as a product manager for SIEM solutions. In this role, he enabled security teams around the globe to detect, investigate, and stop threats within their IT infrastructure. Over the past 10 years, Bart has focused on messaging Threat Intelligence solutions as a product marketing manager at McAfee, FireEye-Mandiant, and recently CrowdStrike. As a go-to-market and technical expert, he witnessed firsthand several shifts in cybercriminal tradecraft. Bart currently focuses on communicating the compelling research from the Infoblox Threat Intel team and delivering thought leadership around the uniqueness of DNS-sourced threat intel. Based close to Boston, Massachusetts, he is currently a member of Infoblox\u2019s product and solutions marketing team. Bart holds a master\u2019s degree in Information Technology Management from Post-University of Limburg, Belgium.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bart-lenaerts-bergmans\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why cybercriminals like DNS | Infoblox","description":"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/","og_locale":"en_US","og_type":"article","og_title":"Why cybercriminals like DNS | Infoblox","og_description":"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.","og_url":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/","og_site_name":"Infoblox Blog","article_published_time":"2024-10-23T18:55:38+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg","type":"image\/jpeg"}],"author":"Bart Lenaerts-Bergmans","twitter_card":"summary_large_image","twitter_title":"Why cybercriminals like DNS | Infoblox","twitter_description":"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg","twitter_misc":{"Written by":"Bart Lenaerts-Bergmans","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/#article","isPartOf":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/"},"author":{"name":"Bart Lenaerts-Bergmans","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/641bd9fbad20df55272970414b97ada9"},"headline":"Threat Actors Abuse DNS to Con Consumers","datePublished":"2024-10-23T18:55:38+00:00","mainEntityOfPage":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/"},"wordCount":1194,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg","keywords":["DNS","Phishing","lookalike domains","Cybercrime","TDS"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/","name":"Why cybercriminals like DNS | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/#primaryimage"},"image":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg","datePublished":"2024-10-23T18:55:38+00:00","description":"Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.","breadcrumb":{"@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-actors-abuse-dns-to-con-consumers-thumbnail-v2.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/threat-intelligence\/threat-actors-abuse-dns-to-con-consumers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Threat Actors Abuse DNS to Con Consumers"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/641bd9fbad20df55272970414b97ada9","name":"Bart Lenaerts-Bergmans","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","caption":"Bart Lenaerts-Bergmans"},"description":"Bart is a Senior Product Marketing Manager with over 20 years of experience in bringing security operations solutions to market. He started his career in the security industry as a product manager for SIEM solutions. In this role, he enabled security teams around the globe to detect, investigate, and stop threats within their IT infrastructure. Over the past 10 years, Bart has focused on messaging Threat Intelligence solutions as a product marketing manager at McAfee, FireEye-Mandiant, and recently CrowdStrike. As a go-to-market and technical expert, he witnessed firsthand several shifts in cybercriminal tradecraft. Bart currently focuses on communicating the compelling research from the Infoblox Threat Intel team and delivering thought leadership around the uniqueness of DNS-sourced threat intel. Based close to Boston, Massachusetts, he is currently a member of Infoblox\u2019s product and solutions marketing team. Bart holds a master\u2019s degree in Information Technology Management from Post-University of Limburg, Belgium.","url":"https:\/\/www.infoblox.com\/blog\/author\/bart-lenaerts-bergmans\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10762"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10762\/revisions"}],"predecessor-version":[{"id":10767,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10762\/revisions\/10767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/10769"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}