{"id":2126,"date":"2015-11-29T18:21:20","date_gmt":"2015-11-29T18:21:20","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2126"},"modified":"2020-05-06T10:30:07","modified_gmt":"2020-05-06T17:30:07","slug":"moller-insights-most-infamous-dns-attacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/","title":{"rendered":"M\u00f6ller Insights &#8211; Most infamous DNS-attacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2128\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/moller-insights.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge. I can\u2019t blame them. Most of the attacks are never made public. For instance; your banks\u2019 online services are down, and the reply is \u2013 \u201cOur service is down due to some upgrades\u201d. And we never doubt this.<\/p>\n<p>But more recently there have been cases in the public eye that caused severe disruption to peoples\u2019 ordinary lives.<\/p>\n<p>Here are a few of the most infamous;<\/p>\n<p><strong>In August this year, one of the largest Internet providers in the Netherlands,\u00a0<\/strong><a href=\"http:\/\/www.nltimes.nl\/2015\/08\/20\/telecom-ziggo-struck-in-second-cyber-attack-this-week\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><strong>Ziggo<\/strong><\/a>, was struck by a DDoS attack leaving hundreds of thousands of customers without access to the internet. After the attack, Ziggo went out to media and claimed that they had taken extra security measures to make it harder for hackers to attack their servers. \u201cIf all goes well, Ziggo customers will no longer be affected by these attacks\u201d, they said.<\/p>\n<p>The day after, there was a second attack, more severe than the first one \u2013 and so Ziggos customers were left without access to the Internet again.<\/p>\n<p>Who was responsible for the attacks? Anonymous has claimed responsibility, but it has not been confirmed. The reason behind the attacks? Apparently it was angry customers who believed that Ziggo had been increasing their prices whilst providing inadequate services, and so they brought down the whole service in a matter of minutes.<\/p>\n<p><strong>In April, the\u00a0<\/strong><a href=\"http:\/\/krebsonsecurity.com\/2015\/05\/st-louis-federal-reserve-suffers-dns-breach\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><strong>St. Louis Federal Reserve<\/strong><\/a><strong>\u00a0suffered a DNS Breach<\/strong>, where the attackers succeeded in hijacking the domain name servers for the institution. It was reported that \u201cthe attack redirected online searches for those seeking a variety of domains run by the government entity to a Web page set up by the attackers in a bid by cybercriminals to hijack online communications of banks and other entities dealing with the regional Fed office\u201d<a target=\"_blank\" rel=\"noopener noreferrer\">[1]<\/a>.<\/p>\n<p><strong>In Sweden<\/strong>, one of our largest communication providers,\u00a0<a href=\"http:\/\/sverigesradio.se\/sida\/artikel.aspx?programid=2054&amp;artikel=6042997\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Telia<\/a>, was the victim of a severe DDOS attack last year. It caused disruption for over 24 hours to five million plus Swedes that use Telia for essential services including telephone, TV and mobile connections.<\/p>\n<p><strong>Last year we witnessed the largest cyberattack in history<\/strong>, when<a href=\"http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/20\/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">independent media sites in Hong Kong<\/a>\u00a0were pounded with junk traffic at 500 gigabits per second. This time the attackers managed to hijack \u201cservers from the Cloud services of Amazon and European hosting provider LeaseWeb, to launch their attack\u201d<a target=\"_blank\" rel=\"noopener noreferrer\">[2]<\/a>. Overwhelmed with requests, ISPs like Virgin Media in the UK\u00a0halted legitimate connections to the sites, saying: \u201cWe\u2019re seeing over 250 million DNS requests per second, which is probably on par with the total DNS requests for the entire Internet in a normal second\u201d.<\/p>\n<p>When speculating on who was behind the attack, it seemed likely to be the Chinese government, an individual person, perhaps wanting the Chinese Government to look bad. No one knows.<\/p>\n<p><strong>We all know about what happened to\u00a0<\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Sony_Pictures_Entertainment_hack\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><strong>Sony Pictures<\/strong><\/a><strong>,\u00a0<\/strong><a href=\"http:\/\/www.wsj.com\/articles\/target-reaches-settlement-with-visa-over-2013-data-breach-1439912013\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><strong>Target<\/strong><\/a><strong>\u00a0and <\/strong><a href=\"http:\/\/www.infosecurity-magazine.com\/news\/hilton-hotels-latest-to-be-hit\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><strong>Hilton<\/strong><\/a><strong>.\u00a0<\/strong>And even more recent is the case of the UK Telecoms company\u00a0<a href=\"http:\/\/www.theguardian.com\/business\/2015\/nov\/06\/nearly-157000-had-data-breached-in-talktalk-cyber-attack\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">TalkTalk<\/a>, the victim of a heist masked by a DDOS-attack. 157 000 of their users were affected by the hack. 28 000 credit and debit card details were stolen, 15 656 bank account numbers were accessed and 1.2 million email addresses, names and phone numbers were also taken. TalkTalk has lost a third of its value since the attack.<\/p>\n<p>Regardless of who\u00b4s behind the attack, all of these attackers have one thing in common and that\u2019s misusing the DNS environment to accomplish what they are set out to do.\u00a0<em>One individual<\/em>, responsible for the largest cyberattack in history. Or<em>a couple<\/em>\u00a0off angry customers using a DDOS attack to voice their complaints, bringing down your whole service.<\/p>\n<p>If that doesn\u2019t make you worry about your DNS security&#8230;<\/p>\n<p><a target=\"_blank\" rel=\"noopener noreferrer\">[1]<\/a>Krebs, Brian: Citing Sources [<a href=\"http:\/\/krebsonsecurity.com\/2015\/05\/st-louis-federal-reserve-suffers-dns-breach\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/krebsonsecurity.com\/2015\/05\/st-louis-federal-reserve-suffers-dns-breach\/<\/a>]: para. 1 [Nov 26 2015]<\/p>\n<p><a target=\"_blank\" rel=\"noopener noreferrer\">[2]<\/a>\u00a0Olson, Parmy: Citing Sources [<a href=\"http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/20\/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/www.forbes.com\/sites\/parmyolson\/2014\/11\/20\/the-largest-cyber-attack-in-history-has-been-hitti&#8230;<\/a>]: para. 6 [Nov 26, 2015]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge. I can\u2019t blame them. Most of the attacks are never made public. For instance; your banks\u2019 online services are down, and the reply is \u2013 \u201cOur service is down due to some upgrades\u201d. And [&hellip;]<\/p>\n","protected":false},"author":197,"featured_media":2128,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[30,16,36],"class_list":{"0":"post-2126","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-dns","9":"tag-infoblox","10":"tag-threats","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>M\u00f6ller Insights - Most infamous DNS-attacks<\/title>\n<meta name=\"description\" content=\"When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M\u00f6ller Insights - Most infamous DNS-attacks\" \/>\n<meta property=\"og:description\" content=\"When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-29T18:21:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fredrik Moller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fredrik Moller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/\"},\"author\":{\"name\":\"Fredrik Moller\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/abf6205b0d8780cb87056fed5ddfc965\"},\"headline\":\"M\u00f6ller Insights &#8211; Most infamous DNS-attacks\",\"datePublished\":\"2015-11-29T18:21:20+00:00\",\"dateModified\":\"2020-05-06T17:30:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/\"},\"wordCount\":651,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/moller-insights.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Threats\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/\",\"name\":\"M\u00f6ller Insights - Most infamous DNS-attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/moller-insights.jpg\",\"datePublished\":\"2015-11-29T18:21:20+00:00\",\"dateModified\":\"2020-05-06T17:30:07+00:00\",\"description\":\"When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/moller-insights.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/moller-insights.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/moller-insights-most-infamous-dns-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"M\u00f6ller Insights &#8211; Most infamous DNS-attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/abf6205b0d8780cb87056fed5ddfc965\",\"name\":\"Fredrik Moller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g\",\"caption\":\"Fredrik Moller\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/fredrik-moller\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"M\u00f6ller Insights - Most infamous DNS-attacks","description":"When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/","og_locale":"en_US","og_type":"article","og_title":"M\u00f6ller Insights - Most infamous DNS-attacks","og_description":"When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/","og_site_name":"Infoblox Blog","article_published_time":"2015-11-29T18:21:20+00:00","article_modified_time":"2020-05-06T17:30:07+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights.jpg","type":"image\/jpeg"}],"author":"Fredrik Moller","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fredrik Moller","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/"},"author":{"name":"Fredrik Moller","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/abf6205b0d8780cb87056fed5ddfc965"},"headline":"M\u00f6ller Insights &#8211; Most infamous DNS-attacks","datePublished":"2015-11-29T18:21:20+00:00","dateModified":"2020-05-06T17:30:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/"},"wordCount":651,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights.jpg","keywords":["DNS","Infoblox","Threats"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/","url":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/","name":"M\u00f6ller Insights - Most infamous DNS-attacks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights.jpg","datePublished":"2015-11-29T18:21:20+00:00","dateModified":"2020-05-06T17:30:07+00:00","description":"When I talk to friends and family, and even IT journalists, the importance of DNS security is not exactly common knowledge.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/moller-insights.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/moller-insights-most-infamous-dns-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"M\u00f6ller Insights &#8211; Most infamous DNS-attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/abf6205b0d8780cb87056fed5ddfc965","name":"Fredrik Moller","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53ad906dfe002f940be7db427fe4bce5c8fb155400d0f5e48d03ef26bdc44daf?s=96&d=blank&r=g","caption":"Fredrik Moller"},"url":"https:\/\/www.infoblox.com\/blog\/author\/fredrik-moller\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/197"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2126"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2126\/revisions"}],"predecessor-version":[{"id":2129,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2126\/revisions\/2129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2128"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}