{"id":13015,"date":"2026-03-04T07:55:17","date_gmt":"2026-03-04T15:55:17","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=13015"},"modified":"2026-03-04T05:36:56","modified_gmt":"2026-03-04T13:36:56","slug":"connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/","title":{"rendered":"Connecting Dots with SSL Certificates: Finding Threat Actors with Graph Theory"},"content":{"rendered":"<p><strong>Authors: Zafir Ansari and Darin Johnson<\/strong><\/p>\n<p>Researchers at Infoblox use many advanced techniques to hunt threat actors and block threats early in their lifecycle. One particularly powerful approach leverages graph theory and SSL certificates to uncover threat actor operational relationships. In this blog, we describe how our certificate-driven threat intelligence system uncovers malicious domains, reveals previously unknown threat actors and consolidates existing ones by merging identities that were once thought to be separate. Without this certificate analysis approach, we would <strong>miss approximately 57 percent of these certificate-related malicious domains.<\/strong><\/p>\n<h3>The Evolution of Cyberthreat Landscapes<\/h3>\n<p>Identifying threat actors has become increasingly challenging as they\u2019ve evolved beyond simple, centralized operations to sophisticated, distributed infrastructures spanning multiple domains and services. This distributed approach helps adversaries evade detection and maintain operational resilience. <\/p>\n<p>While traditional security tools excel at identifying individual malicious domains through reputation feeds and blocklists, they often analyze indicators without connecting them to reveal the broader threat actor infrastructure. Understanding the complete operational footprint of threat actors is crucial\u2014it enables security teams to anticipate future attacks, block entire campaigns rather than individual domains and gain strategic intelligence about adversary capabilities and intentions. Certificate Transparency (CT) logs offer one promising approach to bridge this gap.<\/p>\n<h3>Certificate Transparency Logs: An Untapped Intelligence Source<\/h3>\n<p>CT logs provide a comprehensive, publicly auditable record of every SSL\/TLS certificate issued by a Certificate Authority (CA). While primarily designed as a transparency mechanism for web security, CT logs contain a wealth of operational intelligence. <\/p>\n<p>The key insight lies in how SSL certificates handle multiple domains. When securing multiple related domains with a single certificate, operators list all domains in the certificate\u2019s Subject Alternative Name (SAN) field, as seen in the figure below. This seemingly technical detail creates a valuable intelligence opportunity: domains appearing together in SAN fields often indicate shared operational control.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure1.jpg\" alt=\"Figure 1\" \/><\/p>\n<p class=\"image-caption\">Figure 1: X509 Subject Alternative Name Domain List<\/p>\n<h3>The Trust Foundation of Domain Validation<\/h3>\n<p>The intelligence value stems from CA validation requirements. Before issuing any certificate, CAs must verify ownership of every domain listed in the SAN field through rigorous processes: DNS record modifications, email verification to administrative contacts or HTTP-based challenges. No certificate can be issued without demonstrable control over each listed domain. <\/p>\n<p>This validation requirement creates a high-confidence indicator of operational relationships. When domains appear together in certificate SAN fields, they often represent shared control. <\/p>\n<p>Not all certificate relationships indicate shared operational control, however. Content delivery networks (CDNs) and domain resellers often issue certificates that include customer domains alongside their infrastructure domains, creating apparent relationships between unrelated entities. Understanding and filtering these commercial relationships is crucial for accurate analysis.<\/p>\n<h3>The Power of Graph Theory<\/h3>\n<p>Individual certificates provide valuable operational intelligence, and this intelligence becomes even more powerful through <strong>transitive analysis across multiple certificates<\/strong>. Consider this scenario: <\/p>\n<p>Certificate 1 covers domains {d1.com, d2.com, d3.com}. Certificate 2 covers domains {d3.com, d4.com, d5.com}. Certificate 3 covers domains {d5.com, d6.com, d7.com} <\/p>\n<p>While domains d1.com and d6.com never appear in the same certificate, they\u2019re transitively connected through d3.com and d5.com. This suggests potential common operational control across all seven domains, revealing infrastructure relationships invisible to individual certificate analysis.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure2.png\" alt=\"Figure 2\" \/><\/p>\n<p class=\"image-caption\">Figure 2: Cert relationships via domains<\/p>\n<h3>From Certificates to Operational Intelligence<\/h3>\n<p>Understanding these relationships at scale requires systematic analysis. Graph theory provides an elegant solution: model domains as nodes and certificate relationships as edges, then apply connected component algorithms to identify all transitively related domain groups. <\/p>\n<p>The process begins with individual certificate graphs that appear separate and unconnected. However, when domains appear across multiple certificates, they create bridges that merge these separate components into unified graph components. The accompanying visualizations demonstrate this transformation: initially separate certificate graphs merge through shared domains (d3.com and d5.com in this example), revealing the complete operational component spanning all seven domains. <\/p>\n<p>We process these certificate relationships daily in our production systems, analyzing millions of new certificates and maintaining real-time visibility into emerging domain components as they form and evolve across the internet infrastructure. <\/p>\n<p>This mathematical approach ensures comprehensive coverage\u2014every possible relationship within the certificate data gets captured and analyzed. Each connected component represents a potential operational entity, ranging from simple single-certificate groups to complex multi-certificate infrastructures spanning hundreds of domains.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure3.png\" alt=\"Figure 3\" \/><\/p>\n<p class=\"image-caption\">Figure 3: Initial Separate Certificate Graphs<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure4.png\" alt=\"Figure 4\" \/><\/p>\n<p class=\"image-caption\">Figure 4: Merged Graph: Transitive Domain Relationships Through Certificate Connections<\/p>\n<h3>Temporal Complexity and Evolution<\/h3>\n<p>Domain components aren\u2019t static structures. They evolve continuously as new certificates create connections between previously separate infrastructures. This evolution presents both opportunities and challenges: <\/p>\n<p><strong>Opportunities<\/strong>: Track infrastructure development over time (such as component mergers), identify expansion patterns and observe operational changes  <\/p>\n<p><strong>Challenges<\/strong>: Maintain consistent component identity despite structural changes, handle complex merger scenarios and preserve historical context <\/p>\n<p>We track the temporal and structural evolution of these components over time, maintaining historical continuity while adapting to the dynamic nature of certificate-based relationships. Addressing these challenges requires sophisticated tracking mechanisms that preserve component continuity while adapting to structural evolution\u2014capabilities that become increasingly valuable as threat actors expand and modify their operational footprints. <\/p>\n<h3>Enriching Structural Data with Threat Context<\/h3>\n<p>Raw domain clusters provide structural insights, but they become actionable intelligence when enriched with threat data. This enrichment process involves querying threat intelligence feeds to categorize domains within each cluster as either known malicious\/suspicious entities or unclassified domains. <\/p>\n<p>This binary classification has the inherent limitation of threat intelligence coverage while enabling quantitative cluster analysis. Rather than assuming unknown domains are benign, the approach explicitly recognizes intelligence gaps and incorporates this uncertainty into risk calculations.<\/p>\n<h3>Attribution and Actor Mapping<\/h3>\n<p>Beyond individual domain classification, attribution data reveals which <strong>established<\/strong> threat actors operate domains within each component. This attribution information enables several analytical approaches: <\/p>\n<ul class=\"list-spacing\">\n<li><strong>Single-Actor Clusters<\/strong>: Validate clustering methodology by confirming coherent threat operations<\/li>\n<li><strong>Multi-Actor Clusters<\/strong>: Identify potential collaboration, shared services or operational personas<\/li>\n<li><strong>Unattributed Clusters<\/strong>: Discover emerging threats and previously unknown operations<\/li>\n<\/ul>\n<h3>Risk Assessment and Prioritization<\/h3>\n<p>Converting structural relationships into actionable priorities requires quantitative risk assessment. Statistical approaches provide objective, repeatable methods for evaluating component threat levels. <\/p>\n<p>Using the proportion of malicious domains within each cluster as a foundation, odds ratios and log transformations create risk scores that discriminate effectively between high- and low-risk clusters. These scores map to interpretable risk tiers that guide resource allocation and investigation priorities. <\/p>\n<p>We categorize clusters into different risk tiers for prioritization of higher risk clusters and research the development of threats in low-risk clusters, enabling both immediate threat response and proactive threat hunting across the risk spectrum. <\/p>\n<p>The figure 5 below shows examples of such risk clusters.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure5.png\" alt=\"Figure 5\" \/><\/p>\n<p class=\"image-caption\">Figure 5:  Sample cluster risk tiers<\/p>\n<h3>Expanding Intelligence through Association<\/h3>\n<p>One of the most powerful applications of our approach is expanding threat coverage through association analysis. When some domains in a connected component are confirmed malicious, certificate-based relationships indicate that other domains in the same cluster warrant investigation. <\/p>\n<p>This \u201cguilt by association\u201d method leverages the core insight that domains sharing certificate infrastructure are likely under common control. If confirmed threat actors control a subset of domains in a cluster, other unflagged domains in the same cluster become high-priority investigation targets. <strong>Analysis of moderate-risk clusters alone uncovered 135 percent more malicious or suspicious domains that had previously gone undetected<\/strong>. The figure below illustrates this.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure6.png\" alt=\"Figure 6\" \/><\/p>\n<p class=\"image-caption\">Figure 6:  Domain association graph<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure7.png\" alt=\"Figure 7\" \/><\/p>\n<p class=\"image-caption\">Figure 7:  Guilt by association graph<\/p>\n<h3>Threat Actor Mapping: From Discovery to Consolidation<\/h3>\n<p>When we analyze domain clusters, we often find patterns in how threat actors operate. Some clusters contain domains with no existing threat intelligence. For these malicious clusters, we create new provisional threat actor identities to track their evolution over time. This capability to discover previously unknown threat actors is invaluable for early threat detection. Additionally, clusters containing multiple different threat actors provide another rich source of intelligence. <\/p>\n<p>This is where things get technically interesting. For components with multiple threat actors, we use a hierarchical graph (\u201cgraph of graphs\u201d) approach\u2014constructing threat actor networks where actors become nodes and shared domain components (themselves graphs) create the connecting edges. Think of it like discovering that several apparently independent criminal organizations are actually using the same safe houses and supply chains.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory-figure8.png\" alt=\"Figure 8\" \/><\/p>\n<p class=\"image-caption\">Figure 8. Actor network visualization showing how separate clusters merge into consolidated threat ecosystems<\/p>\n<p>These actor networks reveal relationships that may be missed using other methods of analysis. We see actors sharing certificate infrastructure across multiple clusters, creating transitive connections between previously unrelated threat groups and forming complex ecosystems that suggest either coordination, shared services or different operational faces of the same underlying organization. <\/p>\n<p>Using this hierarchical graph methodology, our production systems process millions of certificate relationships daily to identify these connections. When we apply connected component analysis to threat actor networks, we discover consolidated threat ecosystems where multiple actors collaborate, share resources or represent different operational personas of sophisticated adversarial operations.<\/p>\n<p>The visualization above demonstrates this process: three separate clusters containing different combinations of threat actors ultimately merge into a single connected component, revealing a seven-actor threat ecosystem that would be invisible without this systematic graph analysis.<\/p>\n<h3>Practical Applications and Impact<\/h3>\n<p>This certificate-based approach provides several operational capabilities: <\/p>\n<p><strong>Infrastructure Discovery<\/strong>: Reveal comprehensive domain portfolios operated by single entities, providing visibility into organizational structures that span multiple certificates and operational domains. <\/p>\n<p><strong>Early Warning<\/strong>: Identify emerging threats through lower risk clusters where only a small subset of domains are flagged in traditional intelligence feeds, enabling discovery of domains as suspicious or malicious that were previously not flagged as such while simultaneously identifying the threat actors operating them, often representing the earliest indicators of new campaigns before they appear in traditional intelligence feeds. High-risk clusters, while containing predominantly malicious domains, are also valuable for discovering new threat actor identities and operational connections that may not be present in existing intelligence feeds. <\/p>\n<p><strong>Actor Relationship Mapping and Consolidation<\/strong>: Discover connections between established threat actors through shared infrastructure usage, revealing collaboration patterns or operational relationships. When certificate analysis reveals that apparently different threat actors are actually operational personas of the same underlying entity, we merge these identities to provide clearer intelligence pictures and reduce analytical fragmentation. Finding and accurately attributing threat actors is extremely important for understanding campaign scope and operational context. <\/p>\n<p><strong>Systematic Prioritization<\/strong>: Enable data-driven resource allocation through quantitative risk scores rather than arbitrary threat categorizations or analyst intuition.<\/p>\n<h3>Conclusion<\/h3>\n<p>The volume of certificates issued daily across the internet creates an opportunity to enhance threat intelligence through systematic analysis at scale. Millions of certificate relationships emerge every day, containing valuable operational connections that can strengthen security coverage when properly analyzed. <\/p>\n<p>We harness this potential through our certificate transparency approach, which adds a valuable dimension to threat actor analysis and enables preemptive security measures. Our systems process millions of certificates daily, systematically discovering new threat actors operating previously unknown infrastructure, consolidating threat actor identities when analysis reveals operational connections and identifying domains that warrant further investigation. This automated intelligence pipeline transforms the rich data available in internet certificate records into actionable threat intelligence that enhances security teams\u2019 ability to proactively identify and counter sophisticated adversaries before they can fully establish their operations. Infoblox customers using our default threat intelligence feeds automatically benefit from this pipeline.<\/p>\n<h3>Sample Discoveries<\/h3>\n<p>The following examples demonstrate the operational power of our certificate intelligence system in action. Threat actor clusters represent real threat operations, only a small fraction of which had been flagged as suspicious in open-source threat feeds like VirusTotal. Using certificate analysis, we uncovered many domains related to malicious infrastructure. What makes these discoveries particularly significant is their diversity. Our system doesn\u2019t just catch one type of campaign, including financial fraud, credential harvesting and complex traffic distribution system (TDS) operations. The certificate-based approach reveals threat actor infrastructure across the entire spectrum of cybercriminal activities, regardless of the criminal enterprise\u2019s ultimate purpose.<\/p>\n<table>\n<thead>\n<tr>\n<th>Indicator<\/th>\n<th>Note<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>apple-find[.]xyz, apple-findmys[.]com, com-sms[.]us, find-my-sopport-phone[.]us, find-my-supportd[.]com, icloudservi[.]me, id-my-us[.]com, iflnd-phone-us[.]com, maps-iphone[.]cloud, myphone-lost[.]com, soporte-apple[.]com, soported-appleid[.]com, support-imaps[.]com, alerta-soporte[.]us, apple-mi[.]support, apple-us-lost[.]com, find-87653[.]com[.]tr, findid-clouds[.]com, findmy-dtp[.]sa[.]com, findmyld[.]com, flnd-phone-us[.]com, icloud-id-lost[.]com, icloudsolution[.]us, soportt-apple-lost[.]com, support-lost-phone[.]com, support-lost-us[.]com, apple-lcloud[.]com[.]tr, apple-lost-lnfo[.]com, apple-supportid[.]com, apple-verifid[.]com, applefind[.]net, com-locate[.]space, icioud-aw[.]xyz, icioud-rt[.]xyz, icloud-isuport[.]com, lcloud-find-my[.]org, lost-iphone[.]us, maps-iphone[.]online, supporte-mylost[.]com, applecare-find[.]xyz, findmy-lsupported[.]com, findmyiapple[.]com, icioud-ds[.]com[.]tr, icloudfix[.]me, lcloud-mi[.]online, phone-located[.]support, soport-apple[.]com, sopport-phone-mx[.]org, support-myid[.]com, account-apple-login[.]com, com-login[.]my, find-my-phone-support[.]com, find-my-phone-usa[.]com, find-myclouds[.]com, findmy-getmaps[.]com, findmyy-apple[.]com, icioud-aw[.]com[.]tr, icloudfind[.]my, icloudkey[.]us, icloudservice[.]me, id-findmy-apple[.]com, isuporte-cloud[.]com, ldsupports[.]com, myid-maps[.]com, suport-apple-store[.]com, support-maps-id[.]com, apple-findmiy[.]com, appleld-find[.]com, device-find-apple[.]com, findmy-support-id[.]com, findmyu-supports[.]com, findsmy-id[.]com, findsmy-mapss[.]com, icioud-rt[.]com[.]tr, icloudservi[.]us, idevice-supportd[.]com, ipw[.]sa[.]com, lcloud-soporte[.]online, lostlcloud[.]com, phone-lost[.]support, apple-lnfo-lost-us[.]com, applesupportesen[.]org, find-appleld[.]my, findmyiappie[.]com, flndmy-l[.]com, lcloud-lost[.]com, lcloud-lost[.]online, located-find[.]xyz, lphoneflnd[.]com, apple-ubicado[.]com[.]tr, applemy-locate[.]com, flndcloud[.]com, icioud-ae[.]com[.]tr, icioud-he[.]site, icioud-lh[.]com[.]tr, icioud-ut[.]us, icloud-lost-mode[.]org, icloudfind[.]org, icloudgenerarsoporte[.]com, icloudservice[.]tr, icloudsolutions[.]us, id-lcloud[.]online, lcloud-fmi[.]com, ldfindmy[.]com, maps-support-findmy[.]com, apple-lost-lphone[.]com, apple-lsupports-us[.]com, find-my-icloud[.]org, supportid-findmy[.]com<\/td>\n<td>Cluster of 109 Apple lookalikes<\/td>\n<\/tr>\n<tr>\n<td>618731[.]xyz,<br \/>\n618738[.]xyz,<br \/>\n618715[.]xyz,<br \/>\n618727[.]xyz,<br \/>\n618743[.]xyz,<br \/>\n618749[.]xyz,<br \/>\n618721[.]xyz,<br \/>\n618736[.]xyz,<br \/>\n618740[.]xyz,<br \/>\n618742[.]xyz,<br \/>\n618712[.]xyz,<br \/>\n618713[.]xyz,<br \/>\n618739[.]xyz,<br \/>\n618741[.]xyz,<br \/>\n618751[.]xyz,<br \/>\n618714[.]xyz,<br \/>\n618722[.]xyz,<br \/>\n618723[.]xyz,<br \/>\n618726[.]xyz,<br \/>\n618748[.]xyz,<br \/>\n618735[.]xyz,<br \/>\n618747[.]xyz,<br \/>\n618750[.]xyz,<br \/>\n618744[.]xyz,<br \/>\n618753[.]xyz,<br \/>\n618724[.]xyz,<br \/>\n618733[.]xyz,<br \/>\n618734[.]xyz,<br \/>\n618745[.]xyz,<br \/>\n618737[.]xyz <\/td>\n<td>Cluster of 30 registered domain generation algorithm (RDGA) domains hosting adult content<\/td>\n<\/tr>\n<tr>\n<td>ethereum-gpt[.]com, coinbase-invoice[.]com, dappradar[.]biz, remix-ethereum-ide-bot[.]com <\/td>\n<td>Crypto scam domains<\/td>\n<\/tr>\n<tr>\n<td>qougle[.]com, go\u00f8gl\u00e9[.]com, gg0[.]io, go\u00f3gl\u00e9[.]com<\/td>\n<td>Google lookalikes <\/td>\n<\/tr>\n<tr>\n<td>telegramflp[.]cc,<br \/>\ntelegaenzm[.]top,<br \/>\ntelegrxcnm[.]cc,<br \/>\ntlegraincm[.]cc,<br \/>\ntelegramoimn[.]cc,<br \/>\ntelegraxcim[.]top,<br \/>\ntelegracvm[.]cc,<br \/>\ntelegrasnm[.]cc <\/td>\n<td>Telegram lookalikes<\/td>\n<\/tr>\n<tr>\n<td>bigsale-hu[.]com, bigsale-pl[.]com, buyadp[.]com, buykjm[.]com, evnrsn[.]com, fanskw[.]com, fwerwe[.]com, fwerwetp[.]com, jpdomall-jp[.]com, kr-discountline[.]com, kr-vipdiscount[.]com, kr-vipkrmall[.]com, kr-vipmallmall[.]com, kr-vipsaletop[.]com, linebuy-jp[.]com, mall-hu[.]com, mall-pl[.]com, mallknc[.]com, vip-hotmall-kr[.]com, vip-sale-kr[.]com, vipngf-tw[.]com, ahwae2[.]com, buyjdn[.]com, gr-hotsale[.]com, hotmall-ro[.]com, hotsale-hu[.]com, jponline-jp[.]com, kr-linebuy[.]com, kr-vipluckybuy[.]com, kr-vipsalesale[.]com, kr-vipshopmall[.]com, kr-vipsupermarket[.]com, kr-vipthmallshop[.]com, vip-linemall-kr[.]com, vipbuyonline-kr[.]com, vipstore-jp[.]com, buy-ro[.]com, happybuy-kr[.]com, hotsale-ro[.]com, hotstore-jp[.]com, hu-hotmall[.]com, hu-hotsale[.]com, hu-store[.]com, hyviips[.]com, japanmall-jp[.]com, jpshopmall-jp[.]com, kr-vipbuymall[.]com, kr-vipbuyone[.]com, kr-vipbuyonline[.]com, kr-viphotsale[.]com, kr-vipkrstore[.]com, kr-viponlinestore[.]com, mall-ro[.]com, meyou-jp[.]com, mymall-jp[.]com, onlinevipmall-kr[.]com, shopvip-th[.]com, todaysale-jp[.]com, vipluckybuy-jp[.]com, 365day-jp[.]com, 7iqead[.]com, buyakx[.]com, hu-vipmall[.]com, kr-linemall[.]com, kr-vipbigmall[.]com, kr-vipbuyshop[.]com, kr-vipbuytop[.]com, kr-vipgoodbuy[.]com, kr-viphappybuy[.]com, kr-viphotstore[.]com, kr-vipsaleshop[.]com, kr-vipshoping[.]com, kr-vipshopline[.]com, kr-viptodaysale[.]com, linemall-kr[.]com, lubuys[.]com, mallnxj[.]com, pl-todaysale[.]com, shopyvip-tw[.]com, supermarket-tw[.]com, uyeqa2[.]com, vip-linebuy-kr[.]com, vipmall-th[.]com, 365shopping-pl[.]com, 8jadfaw[.]com, bigsale-ro[.]com, buy-pl[.]com, buyjsn[.]com, bynsd[.]com, dcikj[.]com, dfesxe[.]com, hu-todaysale[.]com, jpvip-jp[.]com, kr-luckybuy[.]com, kr-onlinevipmall[.]com, kr-vipbuybuybuy[.]com, kr-vipshoptop[.]com, kr-vipsuperhot[.]com, kr-vipsupermall[.]com, lulbuy[.]com, pi-shopvip[.]com, top-kr[.]com, vipmallmall-kr[.]com, aieutw3[.]com, ashopou[.]com, dsebea[.]com, hotmall-hu[.]com, hotmall-pl[.]com, hotsale-pl[.]com, hrtyrge[.]com, hu-vipstore[.]com, jp-shop-jp[.]com, kr-365vipmall[.]com, kr-vipmymall[.]com, kr-vipmystore[.]com, kr-viptejiashop[.]com, luckybuy-jp[.]com, mgdert[.]com, shopvip-jp[.]com, vip-hotbuy-kr[.]com, vip-lineshop-kr[.]com, vipdiscount-kr[.]com, zbgde[.]com, aiagaw4[.]com, auyshop[.]com, bestselling-pl[.]com, goodshop-jp[.]com, hu-hot[.]com, hu-vipshop[.]com, kaid-th[.]com, kr-happybuy[.]com, kr-vipbuysale[.]com, kr-vipbuyvip[.]com, kr-vipjinrisale[.]com, kr-vipkrshopping[.]com, kr-viponlineshop[.]com, kr-vipsalestore[.]com, linebuy-kr[.]com, luckybuy-kr[.]com, mchmall[.]com, onlineuw[.]com, shoping-jp[.]com, viphappybuy-jp[.]com, viphappybuy-kr[.]com, vipshop-jp[.]com, vipshopline-jp[.]com, vipshopline-kr[.]com, 365shop-pl[.]com, 90sale-pl[.]com, aaa-pl[.]com, buyosd[.]com, discount-kr[.]com, fanjda[.]com, gr-todaysale[.]com, hu-shopvip[.]com, jp-shopbuy[.]com, kr-vipgimall[.]com, kr-vipinhotsale[.]com, kr-vipshopshop[.]com, kr-vipsupershop[.]com, kr-vipsuperstore[.]com, mlumall[.]com, pl-hot[.]com, pl-hotsale[.]com, ro-todaysale-ro[.]com, shopvip-tw[.]com, thmallshop-jp[.]com, vipgoodbuy-jp[.]com, vipgoodbuy-kr[.]com, buymxj[.]com, firnvse[.]com, hotshopping-ro[.]com, japanstore-jp[.]com, uaeioa2[.]com <\/td>\n<td>174 e-commerce scam websites<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<style>\n.savy-seahorse-table {\nfont-size:14px;\nword-break: keep-all;\n}\n.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {\npadding-right:10px;\n}\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\nmargin-top:auto;\n}\n.list-spacing li{margin-bottom:20px}\n.img-container, .img-container-3-col {\ndisplay: flex;\nflex-wrap: wrap;\njustify-content: space-between;\n}\n.img-container img {\nwidth: 49%;\nmargin-bottom: 10px;\n}\n.img-container-3-col img {\nwidth: 30%;\nmargin-bottom: 10px;\n}\n@media (max-width: 767px) {\n.img-container, .img-container-3-col {\ndisplay: block;\n}\n.img-container img, .img-container-3-col img {\nwidth: 100%;\n}\n.grid-container {\n    grid-template-columns: 1fr!important;\n  }\n}\n@media (min-width: 767px) {\n.img-50{width:50%;}\n}\n.grid-container {\n  display: grid;\n  grid-template-columns: repeat(2, 1fr);\n  gap: 40px;\n  max-width: 800px;\n  margin: 0 auto;\n  align-items: stretch;\n}\n.grid-item {\n   display: flex;\n  flex-direction: column;\n  justify-content: flex-start;\n}\n.grid-item img {\n  width: 100%;\n  height: auto;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Connecting Dots with SSL Certificates<\/span>: Finding Threat Actors with Graph Theory');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Zafir Ansari and Darin Johnson Researchers at Infoblox use many advanced techniques to hunt threat actors and block threats early in their lifecycle. One particularly powerful approach leverages graph theory and SSL certificates to uncover threat actor operational relationships. In this blog, we describe how our certificate-driven threat intelligence system uncovers malicious domains, reveals [&hellip;]<\/p>\n","protected":false},"author":418,"featured_media":13016,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[1590,1591,1592,1593,1594],"class_list":{"0":"post-13015","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-certificate-transparency","9":"tag-ssl-certificate-analysis","10":"tag-threat-actor-attribution","11":"tag-graph-theory-in-cybersecurity","12":"tag-threat-intelligence-infrastructure","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Using SSL Certificates and Graph Theory to Uncover Threat Actors<\/title>\n<meta name=\"description\" content=\"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using SSL Certificates and Graph Theory to Uncover Threat Actors\" \/>\n<meta property=\"og:description\" content=\"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-04T15:55:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zafir Ansari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Using SSL Certificates and Graph Theory to Uncover Threat Actors\" \/>\n<meta name=\"twitter:description\" content=\"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zafir Ansari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/\"},\"author\":{\"name\":\"Zafir Ansari\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/98c7379e7013c08a1f013133925bb24d\"},\"headline\":\"Connecting Dots with SSL Certificates: Finding Threat Actors with Graph Theory\",\"datePublished\":\"2026-03-04T15:55:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/\"},\"wordCount\":2623,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/data-science-blog-thumbnail.jpg\",\"keywords\":[\"Certificate Transparency\",\"SSL certificate analysis\",\"Threat actor attribution\",\"Graph theory in cybersecurity\",\"Threat intelligence infrastructure\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/\",\"name\":\"Using SSL Certificates and Graph Theory to Uncover Threat Actors\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/data-science-blog-thumbnail.jpg\",\"datePublished\":\"2026-03-04T15:55:17+00:00\",\"description\":\"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/data-science-blog-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/data-science-blog-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Connecting Dots with SSL Certificates: Finding Threat Actors with Graph Theory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/98c7379e7013c08a1f013133925bb24d\",\"name\":\"Zafir Ansari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/zafir-ansari-headshot-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/zafir-ansari-headshot-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/zafir-ansari-headshot-96x96.jpg\",\"caption\":\"Zafir Ansari\"},\"description\":\"Zafir is a Data Scientist at Infoblox, where he advances the frontiers of AI-powered cybersecurity through both product development and fundamental research. His work ranges from building production threat detection systems to exploring novel approaches that push the boundaries of network security\u2014employing everything from neural networks to graph algorithms. Before joining Infoblox in 2024, Zafir completed his Master's degree at Northwestern University on a full fellowship, conducting research at the intersection of internet measurement and artificial intelligence. He previously contributed to cutting-edge research at the Internet Security and Privacy Lab.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/zafir-ansari\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using SSL Certificates and Graph Theory to Uncover Threat Actors","description":"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/","og_locale":"en_US","og_type":"article","og_title":"Using SSL Certificates and Graph Theory to Uncover Threat Actors","og_description":"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/","og_site_name":"Infoblox Blog","article_published_time":"2026-03-04T15:55:17+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg","type":"image\/jpeg"}],"author":"Zafir Ansari","twitter_card":"summary_large_image","twitter_title":"Using SSL Certificates and Graph Theory to Uncover Threat Actors","twitter_description":"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg","twitter_misc":{"Written by":"Zafir Ansari","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/"},"author":{"name":"Zafir Ansari","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/98c7379e7013c08a1f013133925bb24d"},"headline":"Connecting Dots with SSL Certificates: Finding Threat Actors with Graph Theory","datePublished":"2026-03-04T15:55:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/"},"wordCount":2623,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg","keywords":["Certificate Transparency","SSL certificate analysis","Threat actor attribution","Graph theory in cybersecurity","Threat intelligence infrastructure"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/","url":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/","name":"Using SSL Certificates and Graph Theory to Uncover Threat Actors","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg","datePublished":"2026-03-04T15:55:17+00:00","description":"See how analyzing SSL certificates with graph theory uncovers hidden cyberthreats, enables early detection and maps attacker ecosystems.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/data-science-blog-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/connecting-dots-with-ssl-certificates-finding-threat-actors-with-graph-theory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Connecting Dots with SSL Certificates: Finding Threat Actors with Graph Theory"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/98c7379e7013c08a1f013133925bb24d","name":"Zafir Ansari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/zafir-ansari-headshot-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/zafir-ansari-headshot-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/zafir-ansari-headshot-96x96.jpg","caption":"Zafir Ansari"},"description":"Zafir is a Data Scientist at Infoblox, where he advances the frontiers of AI-powered cybersecurity through both product development and fundamental research. His work ranges from building production threat detection systems to exploring novel approaches that push the boundaries of network security\u2014employing everything from neural networks to graph algorithms. Before joining Infoblox in 2024, Zafir completed his Master's degree at Northwestern University on a full fellowship, conducting research at the intersection of internet measurement and artificial intelligence. He previously contributed to cutting-edge research at the Internet Security and Privacy Lab.","url":"https:\/\/www.infoblox.com\/blog\/author\/zafir-ansari\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/418"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=13015"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13015\/revisions"}],"predecessor-version":[{"id":13029,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13015\/revisions\/13029"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/13016"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=13015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=13015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=13015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}