{"id":2662,"date":"2016-06-16T00:02:39","date_gmt":"2016-06-16T00:02:39","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2662"},"modified":"2020-05-06T10:28:06","modified_gmt":"2020-05-06T17:28:06","slug":"youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/","title":{"rendered":"You&#8217;ve Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS"},"content":{"rendered":"<p>I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while the attackers \u2013 cybercriminals \u2013 devise clever ways to break through.<\/p>\n<p>Back in the Middle Ages, the typical defense was to build higher, thicker walls. Sadly, that tactic will not work in modern, porous IT networks which have their own secret (DNS) tunnels that can be used to sneak out the crown jewels. Domain Name System (DNS) activity has proven to be a great indicator of malicious activity on IT networks, as illustrated by our announcement today of the Infoblox Security Assessment Report for the first quarter of 2016.<\/p>\n<p>We found that four out of five enterprise networks \u2013 83 percent, to be precise \u2013 showed evidence of malware activity abusing DNS.<\/p>\n<p>Infoblox offers free security assessments to our customers and prospects, where organizations give us files capturing recent DNS traffic on their networks. We run these files through Infoblox DNS Firewall and Infoblox Advanced DNS protection products to look for suspicious activity. External threat data from these evaluations is anonymized and aggregated to produce the Infoblox Security Assessment Report.<\/p>\n<p>In the first quarter of 2016, 519 files capturing DNS traffic were uploaded to Infoblox for assessment, coming from 235 customers across a wide range of industries and geographies. As I said, we found evidence of suspicious activity in 83 percent of those files, including these specific threats:<\/p>\n<ul>\n<li>Botnets \u2013 54%<\/li>\n<li>Protocol anomalies \u2013 54%<\/li>\n<li>DNS tunneling \u2013 18%<\/li>\n<li>ZeuS malware \u2013 17%<\/li>\n<li>Distributed denial of service (DDoS) traffic \u2013 15%<\/li>\n<li>CryptoLocker ransomware \u2013 13%<\/li>\n<li>Amplification and reflection traffic \u2013 12%<\/li>\n<li>Heartbleed \u2013 11%<\/li>\n<\/ul>\n<p>Returning to the siege metaphor, the attackers are succeeding in designing catapults powerful enough to send rocks over the highest walls. Defenders can\u2019t survive just by adding to their walls \u2013 they need to focus on quickly discovering and remediating threats inside the network, before they cause significant damage.<\/p>\n<p>Infoblox can\u2019t sell you a Valyrian steel sword to smite your enemies, but we can help identify and deflect DNS-based threats, as well as make DNS a powerful enforcement point within your network. You can find more information on Infoblox security solutions at\u00a0<a href=\"http:\/\/www.infoblox.com\/security?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.infoblox.com\/security<\/a>.<\/p>\n<p>The full Infoblox Security Assessment Report for the first quarter of 2016 is available at\u00a0<a href=\"http:\/\/www.infoblox.com\/resources\/report\/infoblox-security-assessment-report-2016-q1?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">www.infoblox.com\/resources\/report\/infoblox-security-assessment-report-2016-q1<\/a>. If you want a free Infoblox security assessment for your organization, go to\u00a0<a href=\"http:\/\/www.infoblox.com\/free-malware-report?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.infoblox.com\/free-malware-report<\/a>.<\/p>\n<p>May your network be protected by the old gods and the new!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":2663,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,16,32,15],"class_list":{"0":"post-2662","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-infoblox","10":"tag-malware","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>You&#039;ve Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS<\/title>\n<meta name=\"description\" content=\"I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while the attackers \u2013 cybercriminals \u2013 devise clever ways to break through.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You&#039;ve Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\" \/>\n<meta property=\"og:description\" content=\"I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while the attackers \u2013 cybercriminals \u2013 devise clever ways to break through.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-16T00:02:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"You&#8217;ve Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\",\"datePublished\":\"2016-06-16T00:02:39+00:00\",\"dateModified\":\"2020-05-06T17:28:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Malware\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/\",\"name\":\"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"datePublished\":\"2016-06-16T00:02:39+00:00\",\"dateModified\":\"2020-05-06T17:28:06+00:00\",\"description\":\"I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while the attackers \u2013 cybercriminals \u2013 devise clever ways to break through.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"width\":660,\"height\":454,\"caption\":\"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"You&#8217;ve Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS","description":"I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while the attackers \u2013 cybercriminals \u2013 devise clever ways to break through.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/","og_locale":"en_US","og_type":"article","og_title":"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS","og_description":"I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while the attackers \u2013 cybercriminals \u2013 devise clever ways to break through.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/","og_site_name":"Infoblox Blog","article_published_time":"2016-06-16T00:02:39+00:00","article_modified_time":"2020-05-06T17:28:06+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"You&#8217;ve Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS","datePublished":"2016-06-16T00:02:39+00:00","dateModified":"2020-05-06T17:28:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/"},"wordCount":447,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","keywords":["DNS","Infoblox","Malware","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/","url":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/","name":"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","datePublished":"2016-06-16T00:02:39+00:00","dateModified":"2020-05-06T17:28:06+00:00","description":"I\u2019m a fan of \u201cGame of Thrones,\u201d with all of its sword fights, dragons and mysterious magic. So it shouldn\u2019t be a surprise that I sometimes think of IT security in terms of a medieval castle under siege. The defenders \u2013network and security teams \u2013 build walls and dig moats to protect their organizations while the attackers \u2013 cybercriminals \u2013 devise clever ways to break through.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","width":660,"height":454,"caption":"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/youve-been-hacked-infoblox-finds-4-out-of-5-enterprise-networks-could-be-compromised-based-on-dns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"You&#8217;ve Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2662"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2662\/revisions"}],"predecessor-version":[{"id":2664,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2662\/revisions\/2664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2663"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}