{"id":6910,"date":"2021-08-26T20:42:03","date_gmt":"2021-08-27T03:42:03","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6910"},"modified":"2023-10-12T11:20:32","modified_gmt":"2023-10-12T18:20:32","slug":"new-dns-vulnerability-allows-nation-state-level-spying","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/","title":{"rendered":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that\u00a0 may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent <\/span><a href=\"https:\/\/www.blackhat.com\/html\/press.html\"><span style=\"font-weight: 400;\">BlackHat security conference<\/span><\/a><span style=\"font-weight: 400;\"> by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to this type of attack.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Wiz.io team presented a vulnerability that allowed them to intercept a portion of the worldwide Dynamic DNS (DDNS) traffic going through managed DNS providers like Amazon and Google. DDNS is a process that automatically updates a name server in the Domain Name System (DNS), typically in real time, with the active DDNS configuration of the configured hostnames, addresses or other information. DDNS updates are DNS messages that workstations send to DNS servers when their IP address inside the internal network, or other details, have changed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In essence, the loophole vulnerability allowed the threat researchers to intercept or \u201cwiretap\u201d the DNS traffic from over 15,000 organizations, including Fortune 500 companies, 45 U.S. government agencies, and 85 international government agencies.\u201d The information gathered includes a lot of high value data including computer names, employee names, employee locations, web domain information including entry points that are exposed to the internet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Wiz.io team was able to add the managed DNS provider\u2019s name server itself inside the backend and point it to their internal network. This allowed the Wiz.io team to effectively hijack DNS traffic hitting the hijacked managed DNS provider\u2019s server. They did not receive all DNS traffic going through that server &#8211; only the dynamic DNS updates.\u00a0 The Wiz.io team noted that they could not get the data from a company\u2019s real-time DNS traffic, the DDNS updates did allow them to essentially map the companies and their internal networks that were using the same managed DNS server.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This vulnerability allowed Wiz.io to collect\u00a0 a massive amount of data in a short period of time. Some of the data also could allow threat actors to improve the precision of targeted attacks. This was done by determining the structure of the high-value targets, identifying domain controllers, which in turn could enable the launch of cyberattacks with improved precision.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Wiz.io provides a free DDNS leak tester which can help alert you to the vulnerabilities that might exist within your architecture here: <\/span><a href=\"https:\/\/dynamic-dns-checker.tools.wiz.io\/\"><span style=\"font-weight: 400;\">https:\/\/dynamic-dns-checker.tools.wiz.io\/<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6911\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/DNS-leakaage-1.png\" alt=\"\" width=\"512\" height=\"422\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-leakaage-1.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-leakaage-1-300x247.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<h3><span style=\"font-weight: 400;\">Regaining Visibility and Control of Your Primary Name Server<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In this particular scenario, threat researchers registered domains they did not own inside of the cloud provider, and were able to create any zone inside of the hosted cloud provider. The researchers were able to register a host with the exact name of the cloud provider&#8217;s name servers. This shows that organizations need to control the domain of their primary name server to avoid hijacking of those servers.\u00a0 It also highlighted that cloud service providers need to ensure that certain domains could never be created.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, when endpoints (in this situation, Windows machines) are allowed to send Dynamic DNS requests to a DNS server not controlled by the organization, you lose visibility of where they are going and what they are doing. Best practice is to leverage an endpoint agent that routes DNS traffic to a <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">company owned DNS service<\/span><\/a><span style=\"font-weight: 400;\"> for better visibility, security and control, on and off-premises.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Talk to us about your DNS infrastructure &#8211; reach out to <a href=\"https:\/\/info.infoblox.com\/contact-form\" target=\"_blank\" rel=\"noopener\">https:\/\/info.infoblox.com\/contact-form<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that\u00a0 may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent BlackHat security conference by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":666,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[527,360,567,568,30],"class_list":{"0":"post-6910","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-vulnerability","9":"tag-dns-security","10":"tag-dnsaas","11":"tag-ddns","12":"tag-dns","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d<\/title>\n<meta name=\"description\" content=\"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d . Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent BlackHat security conference by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to this type of attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d\" \/>\n<meta property=\"og:description\" content=\"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d . Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent BlackHat security conference by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to this type of attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-27T03:42:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-12T18:20:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d\",\"datePublished\":\"2021-08-27T03:42:03+00:00\",\"dateModified\":\"2023-10-12T18:20:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"keywords\":[\"vulnerability\",\"DNS Security\",\"DNSaaS\",\"DDNS\",\"DNS\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/\",\"name\":\"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"datePublished\":\"2021-08-27T03:42:03+00:00\",\"dateModified\":\"2023-10-12T18:20:32+00:00\",\"description\":\"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d . Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent BlackHat security conference by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to this type of attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"digital abstract background with skull\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-dns-vulnerability-allows-nation-state-level-spying\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d","description":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d . Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent BlackHat security conference by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to this type of attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/","og_locale":"en_US","og_type":"article","og_title":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d","og_description":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d . Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent BlackHat security conference by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to this type of attack.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/","og_site_name":"Infoblox Blog","article_published_time":"2021-08-27T03:42:03+00:00","article_modified_time":"2023-10-12T18:20:32+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d","datePublished":"2021-08-27T03:42:03+00:00","dateModified":"2023-10-12T18:20:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/"},"wordCount":580,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","keywords":["vulnerability","DNS Security","DNSaaS","DDNS","DNS"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/","url":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/","name":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","datePublished":"2021-08-27T03:42:03+00:00","dateModified":"2023-10-12T18:20:32+00:00","description":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d . Many DNS-as-a-Service (DNSaaS) providers were initially impacted by a vulnerability that may be allowing threat actors to access sensitive information from within corporate networks. Initially this flaw was presented at the recent BlackHat security conference by security researchers Shir Tamari and Ami Luttwak of Wiz.io. The good news is that Infoblox was not vulnerable to this type of attack.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-2.jpg","width":660,"height":454,"caption":"digital abstract background with skull"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-dns-vulnerability-allows-nation-state-level-spying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"New DNS Vulnerability Allows \u201cNation-State Level Spying\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6910"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6910\/revisions"}],"predecessor-version":[{"id":8984,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6910\/revisions\/8984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/666"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}