{"id":12668,"date":"2025-12-11T07:55:01","date_gmt":"2025-12-11T15:55:01","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12668"},"modified":"2025-12-11T03:57:18","modified_gmt":"2025-12-11T11:57:18","slug":"the-dns-threat-landscape-december-2025-a-three-month-lookback","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/","title":{"rendered":"The DNS Threat Landscape December 2025: A Three-month Lookback"},"content":{"rendered":"<p>As 2025 comes to an end, we\u2019re taking a three-month lookback at the DNS threat landscape. How many threat-related domains were discovered, which new actors emerged and how is the actor toolset evolving during the season? <\/p>\n<p>For newcomers: Domain Name System (DNS) is far more than the telephone book of the internet. It is the backbone that precedes every click, connection and transaction. Without DNS, the internet would simply not function\u2014a fact highlighted clearly during a major cloud provider outage in October.<sup>1<\/sup><\/p>\n<h3>View From the Top<\/h3>\n<p>Infoblox analyzes over <strong>70 billion DNS queries per day<\/strong> across <strong>13,000 customers worldwide<\/strong>. A significant portion of these customers use our protective security platform, <strong>Infoblox Threat Defense\u2122<\/strong>.<\/p>\n<p>Between August and November 2025, this preemptive security offering protected <strong>more than 12 million devices per day<\/strong> globally. On average, <strong>648 million response policy zones (RPZs)<\/strong> were applied per day. RPZs act as a powerful defense mechanism\u2014blocking or redirecting DNS traffic tied to malware, phishing or command-and-control (C2) activity. <\/p>\n<p>Between August and November 2025, <strong>over 7.6 million new threat-related domains<\/strong> were discovered\u2014a <strong>20 percent increase<\/strong> compared to the previous quarter. More importantly, <strong>85.4 percent of these domains were identified before any user interaction<\/strong>. <\/p>\n<p>This 20 percent growth reflects both the expanding threat landscape and the increasing adoption of our preemptive security capabilities. <\/p>\n<p>Threat actors rely on numerous techniques when generating domains to their advantage. Domain generation algorithms (DGAs) accounted for most of the activity, but we also observed extensive use of lookalike domains, traffic distribution systems (TDSs) and domains configured for tunneling traffic.<\/p>\n<h3>Zero-Day DNS Detection<\/h3>\n<p>The Infoblox data science team detects in real time newly observed domains not seen across our customer base in the previous 60 days and flagged for high-risk activities such as malicious spam, phishing, lookalike characteristics, DNS tunneling and more.<\/p>\n<p>The daily rate of discovered Zero-Day detections remained steady, averaging between <strong>3,000 and 10,000 domains per day<\/strong>, and none of these domains persist longer than <strong>72 hours<\/strong>. This rapid turnover demonstrates how easily threat actors can replenish and weaponize new infrastructure. For organizations beginning their journey with preemptive DNS security, Zero-Day DNS detections offer an excellent <strong>low-regret blocking opportunity<\/strong>\u2014they pose minimal risk of business disruption while significantly reducing exposure. <\/p>\n<h3>Threat Actors<\/h3>\n<p>Infoblox identifies patterns and commonalities across suspicious or malicious domains. If sufficient evidence across a cluster is found, a threat actor name will be assigned. As of November 15, Infoblox Threat Intel identified more than 258,000 suspicious or malicious domain clusters and over 910 named actors. Three new threat actors were made public this quarter. The most impactful are Detour Dog<sup>2<\/sup> and Vault Viper.<sup>3<\/sup><\/p>\n<h3>Detour Dog: Powering Strela Stealer<\/h3>\n<p>Detour Dog compromised tens of thousands of websites globally using DNS-based malware. Their attacks operate server-side, meaning visitors see a normal website while the infected site secretly issues DNS queries that allow attackers to redirect visitors or deliver malware. The campaign shifted from simple redirect-to-scam tactics to full malware distribution but only to a very small percentage of victims visiting the infected websites.<\/p>\n<p><strong>Key DNS characteristics:<\/strong><\/p>\n<ul class=\"list-spacing\">\n<li>The actor abused DNS TXT records as a covert C2 and payload delivery channel.<\/li>\n<li>Compromised sites make structured DNS TXT requests embedding visitor info. <\/li>\n<li>In some responses, the DNS server sends back Base64-encoded instructions that trigger the site to fetch and execute malicious code from attacker-controlled servers.<\/li>\n<li>The DNS-orchestrated malware includes a backdoor (StarFish) and the infostealer Strela Stealer.<\/li>\n<\/ul>\n<p><strong>Detour Dog\u2019s infrastructure is resilient and stealthy \u2014 even after takedown attempts, they recover quickly<\/strong>. In August 2025, attempts to sinkhole their C2 domain briefly interrupted operations, but Detour Dog restored control within hours; analysis of sinkhole traffic revealed ~30,000 infected hosts, with spikes to over 2 million DNS TXT requests in an hour.<\/p>\n<h3>Vault Viper: High Stakes, Hidden Threats<\/h3>\n<p>Vault Viper represents a large-scale cybercrime operation intertwined with illegal gambling platforms and organized crime in Southeast Asia. What began as an investigation into gambling websites in Cambodia uncovered an extensive ecosystem tied to a major iGaming \u201cwhite-label\u201d provider.<\/p>\n<p>At the center is the <strong>Universe Browser<\/strong>, promoted as a censorship-bypassing \u201cprivacy\u201d tool but functioning like malware: <\/p>\n<ul class=\"list-spacing\">\n<li>Routes all traffic through attacker-controlled infrastructure<\/li>\n<li>Silently installs persistent background programs<\/li>\n<li>Alters network configurations<\/li>\n<li>Exhibits behaviors similar to remote access trojans (RATs)<\/li>\n<\/ul>\n<p>The Windows installer employs anti-VM checks, code injection, persistence mechanisms and keylogging\u2014supporting credential theft and surveillance.<\/p>\n<p>Vault Viper maintains tens of thousands of domains in its DNS infrastructure, enabling global resilience. Researchers used a distinct DNS signature to trace a sprawling network of companies, hosting providers, registrars and servers. The operation intersects with major organized-crime activities including money laundering, fraud, human trafficking and iGaming.<\/p>\n<p>Vault Viper is not just a cyberthreat\u2014it is a convergence point for digital and traditional criminal enterprises.<\/p>\n<h3>ClickFix: Tricking Users, Evading Endpoints<\/h3>\n<p>While not tied directly to the above actors, ClickFix remains a persistent and high-impact threat. ClickFix is a social engineering technique, not a single campaign or actor. Its purpose is to push victims into a malicious \u201ccall to action,\u201d often through fake CAPTCHAs or interaction prompts. Because these elements seem familiar, users click without hesitation\u2014which is exactly what attackers want.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/tis-the-season-image1.jpeg\" alt=\"Figure 1. IoCs from Mastodon Channel (@InfobloxThreatIntel)\" \/><\/p>\n<p class=\"image-caption\">Figure 1. IoCs from Mastodon Channel (@InfobloxThreatIntel)<sup>4<\/sup><\/p>\n<p>ClickFix is particularly dangerous because it is a living-off-the-land technique. Instead of introducing new binaries that endpoint detection and response (EDR) tools can easily detect, the threat actor abuses via ClickFix built-in system tools like MSHTA.<\/p>\n<p>In a recent observed campaign, attackers leveraged the legitimate Windows tool MSHTA to execute commands. To their advantage, most open-source scanning tools (e.g., VirusTotal) did not flag associated domains as malicious and allowed them to continue their malicious operation. As a result, Fake CAPTCHA and ClickFix-style attacks are here to stay.<\/p>\n<h3>Holiday Lures and Seasonal Risks<\/h3>\n<p>Cybercriminals take advantage of every opportunity to lure victims into their traps, and the holidays are no exception. Every holiday season Infoblox Threat Intel sees a wide range of criminal threats emerging, from fake shops to malware. Domains are registered to look like well-known brands, kits allow scammers to quickly build thousands of fake shops, links in email lead to malware downloads. Easy access to AI to build images and create compelling text content makes it even easier to run these campaigns at scale.<\/p>\n<p><strong>Use of AI Images in Spam Campaigns<\/strong><\/p>\n<p>We\u2019re also seeing the use of AI images to bolster spam campaigns like using a legitimate email marketing firm and impersonating Amazon. The account has subsequently been suspended (target domains unobtainable).<\/p>\n<p>This demonstrates the use of AI image generation, e.g., the use of the Amazon Smile logo but malformed text (see Figure 2).<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/tis-the-season-image2.jpeg\" alt=\"Figure 2. Holiday lures\" \/><\/p>\n<p class=\"image-caption\">Figure 2. Holiday lures<\/p>\n<p>Another holiday theme frequently exploited by threat actors is <strong>travel<\/strong>. Those planning to get away over the holidays should stay vigilant for suspicious attachments. Recently, Infoblox Threat Intel has observed high volumes of <strong>booking-related phishing emails<\/strong> that prey on travel-minded users. <\/p>\n<table class=\"calloutbox\">\n<tbody>\n<tr>\n<td>Subjects: <\/p>\n<ul>\n<li>Re: Booking Request [&#8230;]<\/li>\n<li>Re: Booking Confirmation<\/li>\n<li>Booking Confirmation<\/li>\n<li>Malicious attachments observed:<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"image-caption\">Figure 3. Travel-related subjects used by threat actors<\/p>\n<p>Holidays and vacations can lead to reduced security staffing and delayed countermeasures. With fewer people available, alert queues grow, resulting in slower triage or missed indicators altogether\u2014and attackers often exploit these gaps deliberately. The average dwell time (the period between compromise and detection) increases when teams are understaffed, giving attackers more time for lateral movement and data exfiltration.<\/p>\n<p>Reduced IT and security staffing also means that patch rollouts and testing slow significantly. Many organizations implement a change freeze or adopt a more cautious posture during the holiday period (or fiscal year-end) to avoid operational disruptions. This delays security-critical updates and leaves systems exposed.<\/p>\n<h3>The Need for Preemptive Security and DNS-Based Controls<\/h3>\n<p>Threat actors have access to an almost unlimited supply of domains and use them to their advantage. Because most threat-related domains are configured days or weeks before an attack, they present an excellent opportunity to proactively block high-risk connections\u2014enabling preemptive security that is especially valuable during periods of increased seasonal risk.<\/p>\n<p>As actors continuously find new ways to deceive both victims and threat researchers, security teams need reliable methods to uncover emerging threats. Identifying malicious infrastructure using DNS intelligence, rather than relying solely on payload analysis, provides significant opportunities for more effective protection and reduces the strain on existing security tools.<\/p>\n<p>Review our <a href=\"https:\/\/www.infoblox.com\/resources\/webinars\/threat-briefing-q4-2025\/\" target=\"_blank\"><strong>End-of-Year Threat Briefing<\/strong><\/a>.<\/p>\n<p>Download the <a href=\"https:\/\/www.infoblox.com\/resources\/report\/infoblox-2025-dns-threat-landscape-report\/\" target=\"_blank\"><strong>Infoblox DNS Threat Landscape Report<\/strong><\/a>.<\/p>\n<h3 style=\"font-size:18px;\">Footnotes<\/h3>\n<ol style=\"font-size:14px;\">\n<li>Amazon reveals cause of AWS outage that took everything from banks to smart beds offline, Taylor, Josh, The Guardian, October 24, 2025. <a href=\"https:\/\/www.theguardian.com\/technology\/2025\/oct\/24\/amazon-reveals-cause-of-aws-outage\" target=\"_blank\"><strong>https:\/\/www.theguardian.com\/technology\/2025\/oct\/24\/amazon-reveals-cause-of-aws-outage<\/strong><\/a><\/li>\n<li>Detour Dog: DNS Malware Powers Strela Stealer Campaigns, Infoblox Threat Intel, September 30, 2025. <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/detour-dog-dns-malware-powers-strela-stealer-campaigns\/\"><strong>https:\/\/blogs.infoblox.com\/threat-intelligence\/detour-dog-dns-malware-powers-strela-stealer-campaigns\/<\/strong><\/a><\/li>\n<li>Vault Viper: High Stakes, Hidden Threats, Infoblox Threat Intel, October 23, 2025. <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/vault-viper-high-stakes-hidden-threats\/\"><strong>https:\/\/blogs.infoblox.com\/threat-intelligence\/vault-viper-high-stakes-hidden-threats\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/mastodon.social\/@InfobloxThreatIntel@infosec.exchange\/115447549140669903\" target=\"_blank\"><strong>https:\/\/mastodon.social\/@InfobloxThreatIntel@infosec.exchange\/115447549140669903<\/strong><\/a><\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\n.list-spacing-sm li{margin-bottom: 10px;}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n.list-spacing li {\n    margin-bottom: 20px;\n}\n.single-post .carousel-cell article { height: 400px; }\n.responsive-section {\n  display: flex;\n  flex-wrap: wrap;\n}\n.image-container,\n.text-container {\n  flex: 1 1 100%;\n  box-sizing: border-box;\n  padding: 10px;\n}\n.image-container img {\n  max-width: 100%;\n  height: auto;\n  display: block;\n}\n@media (min-width: 992px) {\n  .image-container,\n  .text-container {\n    flex: 0 0 50%;\n  }\n}\n@media (max-width: 991px) {\n  .image-container,\n  .text-container {\n    padding-left: 0;\n    padding-right: 0;\n  }\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">The DNS Threat Landscape December 2025<\/span>: A Three-month Lookback');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2025 comes to an end, we\u2019re taking a three-month lookback at the DNS threat landscape. How many threat-related domains were discovered, which new actors emerged and how is the actor toolset evolving during the season? For newcomers: Domain Name System (DNS) is far more than the telephone book of the internet. It is the [&hellip;]<\/p>\n","protected":false},"author":407,"featured_media":12669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1491,1492,1493,1494,1495],"class_list":{"0":"post-12668","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns-threat-landscape-2025","9":"tag-zero-day-dns-detections","10":"tag-detour-dog-malware","11":"tag-vault-viper-threat-actor","12":"tag-holiday-cyber-risks","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>December 2025 Threat Report: Rising Threat Domains, New Malware Actors &amp; Seasonal Cyber Risks<\/title>\n<meta name=\"description\" content=\"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"December 2025 Threat Report: Rising Threat Domains, New Malware Actors &amp; Seasonal Cyber Risks\" \/>\n<meta property=\"og:description\" content=\"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T15:55:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bart Lenaerts-Bergmans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"December 2025 Threat Report: Rising Threat Domains, New Malware Actors &amp; Seasonal Cyber Risks\" \/>\n<meta name=\"twitter:description\" content=\"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bart Lenaerts-Bergmans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/\"},\"author\":{\"name\":\"Bart Lenaerts-Bergmans\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/641bd9fbad20df55272970414b97ada9\"},\"headline\":\"The DNS Threat Landscape December 2025: A Three-month Lookback\",\"datePublished\":\"2025-12-11T15:55:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/\"},\"wordCount\":1444,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/tis-the-season-thumbnail.jpeg\",\"keywords\":[\"DNS threat landscape 2025\",\"Zero-Day DNS detections\",\"Detour Dog malware\",\"Vault Viper threat actor\",\"Holiday cyber risks\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/\",\"name\":\"December 2025 Threat Report: Rising Threat Domains, New Malware Actors & Seasonal Cyber Risks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/tis-the-season-thumbnail.jpeg\",\"datePublished\":\"2025-12-11T15:55:01+00:00\",\"description\":\"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/tis-the-season-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/tis-the-season-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-dns-threat-landscape-december-2025-a-three-month-lookback\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The DNS Threat Landscape December 2025: A Three-month Lookback\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/641bd9fbad20df55272970414b97ada9\",\"name\":\"Bart Lenaerts-Bergmans\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"caption\":\"Bart Lenaerts-Bergmans\"},\"description\":\"Bart is a Senior Product Marketing Manager with over 20 years of experience in bringing security operations solutions to market. He started his career in the security industry as a product manager for SIEM solutions. In this role, he enabled security teams around the globe to detect, investigate, and stop threats within their IT infrastructure. Over the past 10 years, Bart has focused on messaging Threat Intelligence solutions as a product marketing manager at McAfee, FireEye-Mandiant, and recently CrowdStrike. As a go-to-market and technical expert, he witnessed firsthand several shifts in cybercriminal tradecraft. Bart currently focuses on communicating the compelling research from the Infoblox Threat Intel team and delivering thought leadership around the uniqueness of DNS-sourced threat intel. Based close to Boston, Massachusetts, he is currently a member of Infoblox\u2019s product and solutions marketing team. Bart holds a master\u2019s degree in Information Technology Management from Post-University of Limburg, Belgium.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bart-lenaerts-bergmans\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"December 2025 Threat Report: Rising Threat Domains, New Malware Actors & Seasonal Cyber Risks","description":"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/","og_locale":"en_US","og_type":"article","og_title":"December 2025 Threat Report: Rising Threat Domains, New Malware Actors & Seasonal Cyber Risks","og_description":"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/","og_site_name":"Infoblox Blog","article_published_time":"2025-12-11T15:55:01+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Bart Lenaerts-Bergmans","twitter_card":"summary_large_image","twitter_title":"December 2025 Threat Report: Rising Threat Domains, New Malware Actors & Seasonal Cyber Risks","twitter_description":"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg","twitter_misc":{"Written by":"Bart Lenaerts-Bergmans","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/"},"author":{"name":"Bart Lenaerts-Bergmans","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/641bd9fbad20df55272970414b97ada9"},"headline":"The DNS Threat Landscape December 2025: A Three-month Lookback","datePublished":"2025-12-11T15:55:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/"},"wordCount":1444,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg","keywords":["DNS threat landscape 2025","Zero-Day DNS detections","Detour Dog malware","Vault Viper threat actor","Holiday cyber risks"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/","url":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/","name":"December 2025 Threat Report: Rising Threat Domains, New Malware Actors & Seasonal Cyber Risks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg","datePublished":"2025-12-11T15:55:01+00:00","description":"Explore the latest DNS threat insights, Zero-Day detections, evolving malware campaigns, and holiday-season risks impacting global organizations.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/tis-the-season-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-dns-threat-landscape-december-2025-a-three-month-lookback\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The DNS Threat Landscape December 2025: A Three-month Lookback"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/641bd9fbad20df55272970414b97ada9","name":"Bart Lenaerts-Bergmans","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","caption":"Bart Lenaerts-Bergmans"},"description":"Bart is a Senior Product Marketing Manager with over 20 years of experience in bringing security operations solutions to market. He started his career in the security industry as a product manager for SIEM solutions. In this role, he enabled security teams around the globe to detect, investigate, and stop threats within their IT infrastructure. Over the past 10 years, Bart has focused on messaging Threat Intelligence solutions as a product marketing manager at McAfee, FireEye-Mandiant, and recently CrowdStrike. As a go-to-market and technical expert, he witnessed firsthand several shifts in cybercriminal tradecraft. Bart currently focuses on communicating the compelling research from the Infoblox Threat Intel team and delivering thought leadership around the uniqueness of DNS-sourced threat intel. Based close to Boston, Massachusetts, he is currently a member of Infoblox\u2019s product and solutions marketing team. Bart holds a master\u2019s degree in Information Technology Management from Post-University of Limburg, Belgium.","url":"https:\/\/www.infoblox.com\/blog\/author\/bart-lenaerts-bergmans\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12668"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12668\/revisions"}],"predecessor-version":[{"id":12678,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12668\/revisions\/12678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12669"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}