{"id":3086,"date":"2015-02-25T17:54:05","date_gmt":"2015-02-25T17:54:05","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3086"},"modified":"2020-05-06T10:30:14","modified_gmt":"2020-05-06T17:30:14","slug":"advanced-persistent-threats-exploit-dns-to-steal-data-are-you","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/","title":{"rendered":"Advanced Persistent Threats Exploit DNS to Steal Data. Are You Prepared?"},"content":{"rendered":"<p>It\u2019s obvious that data breaches are impacting organizations of all sizes, industries and geographies, but what may not be obvious is how the Domain Name System (DNS) is often used by Advanced Persistent Threats (APTs) to infect devices inside corporate networks and to exfiltrate data. Traditional security mechanisms aren\u2019t focused on DNS and, often, no single person or team within the IT organization is responsible for DNS security.<\/p>\n<p>What if you could make DNS a security asset inside your organization, to defeat or at least slow down the bad guys and protect your company\u2019s precious data assets?<\/p>\n<p>Join me for a 30-minute webinar at 1 pm Eastern on March 4 as I share insights on:<\/p>\n<ul>\n<li>DNS attacks that can infect network devices and exfiltrate data.<\/li>\n<li>Best practices for securing DNS to defend against APTs.<\/li>\n<li>A proven solution for empowering DNS servers to defend themselves.<\/li>\n<\/ul>\n<p>To register,\u00a0<a href=\"http:\/\/w.on24.com\/r.htm?e=937635&amp;s=1&amp;k=7721251077FBC5DDD2BA8A253896CE61\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">click here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s obvious that data breaches are impacting organizations of all sizes, industries and geographies, but what may not be obvious is how the Domain Name System (DNS) is often used by Advanced Persistent Threats (APTs) to infect devices inside corporate networks and to exfiltrate data. Traditional security mechanisms aren\u2019t focused on DNS and, often, no [&hellip;]<\/p>\n","protected":false},"author":264,"featured_media":2648,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15,74],"class_list":{"0":"post-3086","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"tag-security-alerts","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Is Automating Your Network Like Finding the Lost Book In A Library? How Infoblox Automation Can Help!<\/title>\n<meta name=\"description\" content=\"Over the past month-and-a-half, I&#039;ve shared some articles with you about the go-junos library, mostly regarding how it works.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advanced Persistent Threats Exploit DNS to Steal Data. Are You Prepared?\" \/>\n<meta property=\"og:description\" content=\"Over the past month-and-a-half, I&#039;ve shared some articles with you about the go-junos library, mostly regarding how it works.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-25T17:54:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Seema Kathuria\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Seema Kathuria\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/\"},\"author\":{\"name\":\"Seema Kathuria\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\"},\"headline\":\"Advanced Persistent Threats Exploit DNS to Steal Data. Are You Prepared?\",\"datePublished\":\"2015-02-25T17:54:05+00:00\",\"dateModified\":\"2020-05-06T17:30:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/\"},\"wordCount\":160,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Security Alerts\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/\",\"name\":\"Is Automating Your Network Like Finding the Lost Book In A Library? How Infoblox Automation Can Help!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"datePublished\":\"2015-02-25T17:54:05+00:00\",\"dateModified\":\"2020-05-06T17:30:14+00:00\",\"description\":\"Over the past month-and-a-half, I've shared some articles with you about the go-junos library, mostly regarding how it works.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/may-13-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"Five Recommendations for Improving Network Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Advanced Persistent Threats Exploit DNS to Steal Data. Are You Prepared?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\",\"name\":\"Seema Kathuria\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"caption\":\"Seema Kathuria\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/seema-kathuria\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Is Automating Your Network Like Finding the Lost Book In A Library? How Infoblox Automation Can Help!","description":"Over the past month-and-a-half, I've shared some articles with you about the go-junos library, mostly regarding how it works.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/","og_locale":"en_US","og_type":"article","og_title":"Advanced Persistent Threats Exploit DNS to Steal Data. Are You Prepared?","og_description":"Over the past month-and-a-half, I've shared some articles with you about the go-junos library, mostly regarding how it works.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/","og_site_name":"Infoblox Blog","article_published_time":"2015-02-25T17:54:05+00:00","article_modified_time":"2020-05-06T17:30:14+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","type":"image\/jpeg"}],"author":"Seema Kathuria","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Seema Kathuria","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/"},"author":{"name":"Seema Kathuria","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a"},"headline":"Advanced Persistent Threats Exploit DNS to Steal Data. Are You Prepared?","datePublished":"2015-02-25T17:54:05+00:00","dateModified":"2020-05-06T17:30:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/"},"wordCount":160,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","keywords":["Infoblox","Security","Security Alerts"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/","url":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/","name":"Is Automating Your Network Like Finding the Lost Book In A Library? How Infoblox Automation Can Help!","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","datePublished":"2015-02-25T17:54:05+00:00","dateModified":"2020-05-06T17:30:14+00:00","description":"Over the past month-and-a-half, I've shared some articles with you about the go-junos library, mostly regarding how it works.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/may-13-2.jpg","width":660,"height":454,"caption":"Five Recommendations for Improving Network Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/advanced-persistent-threats-exploit-dns-to-steal-data-are-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Advanced Persistent Threats Exploit DNS to Steal Data. Are You Prepared?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a","name":"Seema Kathuria","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","caption":"Seema Kathuria"},"url":"https:\/\/www.infoblox.com\/blog\/author\/seema-kathuria\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3086"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3086\/revisions"}],"predecessor-version":[{"id":3089,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3086\/revisions\/3089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2648"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}