{"id":3403,"date":"2014-08-11T12:36:10","date_gmt":"2014-08-11T12:36:10","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3403"},"modified":"2020-05-06T10:31:33","modified_gmt":"2020-05-06T17:31:33","slug":"poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/","title":{"rendered":"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs"},"content":{"rendered":"<p class=\"p1\">Eye of newt, and toe of frog,<br \/>\nWool of bat, and tongue of dog,<br \/>\nAdder&#8217;s fork, and blind-worm&#8217;s sting,<br \/>\nLizard&#8217;s leg, and howlet&#8217;s wing,&#8211;<br \/>\nFor a charm of powerful trouble,<br \/>\nLike a hell-broth boil and bubble.<\/p>\n<p class=\"p1 rteindent1\">-Macbeth, Act IV, Scene I<\/p>\n<p>Macbeth\u2019s witches have nothing on today\u2019s hackers when it comes to evil intent and perverse cleverness.<\/p>\n<p>According to\u00a0<a href=\"http:\/\/www.fireeye.com\/blog\/technical\/targeted-attack\/2014\/08\/operation-poisoned-hurricane.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">threat researchers at Infoblox partner FireEye<\/a>, an as-yet-unidentified group of cybercriminals that uses spear-fishing to compromise systems and then uses malware to steal sensitive information has been thinking out of the box.<\/p>\n<p>These particular attacks revealed an alarming escalation in the sheer ingenuity of the hacking community. One ingredient of the hacker\u2019s brew was a free service from Google called \u201cGoogle Developer\u201d (previously \u201cGoogle Code\u201d), and this is not the first time that services such as\u00a0<a href=\"http:\/\/www.csoonline.com\/article\/2134158\/mobile-security\/rise-seen-in-use-of-google-service-for-mobile-botnets.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Google Cloud Messaging<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.csoonline.com\/article\/2158843\/social-engineering\/scammers-still-using-google-drive-for-phishing-attacks.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Google Drive<\/a>\u00a0have been used in hacking attacks.<\/p>\n<p>But this time Google was only one of many ingredients.\u00a0<a href=\"http:\/\/www.csoonline.com\/article\/2462409\/data-protection\/how-hackers-used-google-in-stealing-corporate-data.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The attack<\/a>s also incorporated a legitimate digital certificate from a police mutual aid association; \u00a0the Kaba RAT; DNS services from Hurricane Electric, an ISP in California (hence the name \u201cPoisoned Hurricane\u201d); and infected clients at other ISPs in the United States and Asia, an Asian financial institution, and Asian government organizations.<\/p>\n<p>In this multi-victim attack, Google and Hurricane Electric became unwilling accomplices, used by the attackers as switching stations to redirect traffic that appeared to be headed toward legitimate domains such as adobe.com and outlook.com.<\/p>\n<p>The attackers took advantage of the fact that Hurricane Electric\u2019s domain name servers were configured to allow anyone to register for a free account, register a DNS zone, and create records to point to any IP address\u2014in this case, the hackers\u2019 command and control servers.\u00a0Subsequently, it was revealed\u00a0that anyone could register for a free account with Hurricane Electric\u2019s hosted DNS service. Via this service, anyone with an account was able to register a zone and create A records for the registered zone and point those A records to any IP address they so desired. The dangerous aspect of this service is that anyone was able to hijack legitimate domains such as adobe.com. Although these nameservers are not recursors and were not designed to be queried directly by end users, they were returning results if queried directly for domains that were configured via Hurricane Electrics public DNS service. Furthermore, Hurricane Electric did not check if zones created by their users were already been registered or are otherwise legitimately owned by other parties.<\/p>\n<p>FireEye detected the attacks in March of this year and notified Google and Hurricane. But this new technique presents a significant danger going forward. Many IT organizations still rely on passive visual inspection of URLs to make sure connections are valid\u2014and that won\u2019t help to detect the Poison Hurricane attack.<\/p>\n<p class=\"p1\">This reiterates the need to secure the infrastructure and follow best practices around the core servcies like DNS.\u00a0Services like FireEye\u2019s worldwide sensor network and Infoblox\u2019s Malware Data Feed, and solutions like the Infoblox DNS Firewall \u2013 FireEye Adapter, are the best available way to actively combat increasingly insidious malware attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eye of newt, and toe of frog, Wool of bat, and tongue of dog, Adder&#8217;s fork, and blind-worm&#8217;s sting, Lizard&#8217;s leg, and howlet&#8217;s wing,&#8211; For a charm of powerful trouble, Like a hell-broth boil and bubble. -Macbeth, Act IV, Scene I Macbeth\u2019s witches have nothing on today\u2019s hackers when it comes to evil intent and [&hellip;]<\/p>\n","protected":false},"author":254,"featured_media":2512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15],"class_list":{"0":"post-3403","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs<\/title>\n<meta name=\"description\" content=\"Eye of newt, and toe of frog,Wool of bat, and tongue of dog,Adder&#039;s fork, and blind-worm&#039;s sting,Lizard&#039;s leg, and howlet&#039;s wing,--For a charm of powerful trouble,Like a hell-broth boil and bubble.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs\" \/>\n<meta property=\"og:description\" content=\"Eye of newt, and toe of frog,Wool of bat, and tongue of dog,Adder&#039;s fork, and blind-worm&#039;s sting,Lizard&#039;s leg, and howlet&#039;s wing,--For a charm of powerful trouble,Like a hell-broth boil and bubble.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-11T12:36:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/101057330-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Renuka Nadkarni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Renuka Nadkarni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/\"},\"author\":{\"name\":\"Renuka Nadkarni\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\"},\"headline\":\"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs\",\"datePublished\":\"2014-08-11T12:36:10+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/\"},\"wordCount\":547,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/101057330-660x454.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/\",\"name\":\"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/101057330-660x454.jpg\",\"datePublished\":\"2014-08-11T12:36:10+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"description\":\"Eye of newt, and toe of frog,Wool of bat, and tongue of dog,Adder's fork, and blind-worm's sting,Lizard's leg, and howlet's wing,--For a charm of powerful trouble,Like a hell-broth boil and bubble.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/101057330-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/101057330-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 is Accelerating as IPv4 is Nearing its Peak\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\",\"name\":\"Renuka Nadkarni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"caption\":\"Renuka Nadkarni\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/renuka-nadkarni\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs","description":"Eye of newt, and toe of frog,Wool of bat, and tongue of dog,Adder's fork, and blind-worm's sting,Lizard's leg, and howlet's wing,--For a charm of powerful trouble,Like a hell-broth boil and bubble.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/","og_locale":"en_US","og_type":"article","og_title":"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs","og_description":"Eye of newt, and toe of frog,Wool of bat, and tongue of dog,Adder's fork, and blind-worm's sting,Lizard's leg, and howlet's wing,--For a charm of powerful trouble,Like a hell-broth boil and bubble.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/","og_site_name":"Infoblox Blog","article_published_time":"2014-08-11T12:36:10+00:00","article_modified_time":"2020-05-06T17:31:33+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/101057330-660x454.jpg","type":"image\/jpeg"}],"author":"Renuka Nadkarni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Renuka Nadkarni","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/"},"author":{"name":"Renuka Nadkarni","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9"},"headline":"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs","datePublished":"2014-08-11T12:36:10+00:00","dateModified":"2020-05-06T17:31:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/"},"wordCount":547,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/101057330-660x454.jpg","keywords":["Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/","url":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/","name":"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/101057330-660x454.jpg","datePublished":"2014-08-11T12:36:10+00:00","dateModified":"2020-05-06T17:31:33+00:00","description":"Eye of newt, and toe of frog,Wool of bat, and tongue of dog,Adder's fork, and blind-worm's sting,Lizard's leg, and howlet's wing,--For a charm of powerful trouble,Like a hell-broth boil and bubble.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/101057330-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/101057330-660x454.jpg","width":660,"height":454,"caption":"IPv6 is Accelerating as IPv4 is Nearing its Peak"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/poisoned-hurricane-stirs-a-cauldron-of-hijacked-ingredients-into\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"\u201cPoisoned Hurricane\u201d Stirs a Cauldron of Hijacked Ingredients into a Malicious Brew of APTs"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9","name":"Renuka Nadkarni","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","caption":"Renuka Nadkarni"},"url":"https:\/\/www.infoblox.com\/blog\/author\/renuka-nadkarni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/254"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3403"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3403\/revisions"}],"predecessor-version":[{"id":4076,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3403\/revisions\/4076"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2512"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}