{"id":7104,"date":"2021-10-14T12:57:29","date_gmt":"2021-10-14T19:57:29","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7104"},"modified":"2021-10-16T21:33:28","modified_gmt":"2021-10-17T04:33:28","slug":"what-should-dns-administrators-learn-from-tomiris","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/","title":{"rendered":"What Should DNS Administrators Learn from Tomiris?"},"content":{"rendered":"<p>I suppose the first thing DNS administrators should learn is <em>what Tomiris is<\/em>, since as of just a few days ago, I had no idea.\u00a0 Tomiris is malware recently <a href=\"https:\/\/securelist.com\/darkhalo-after-solarwinds-the-tomiris-connection\/104311\/\">identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT)<\/a>.\u00a0 Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably the compromise of registrar accounts.<\/p>\n<p>Tomiris spread thanks to a compromise that enabled the bad guys to modify the delegation for the domains of a Central Asian government, possibly Kyrgyzstan or Kazakhstan.\u00a0 By changing the delegation of these government domains, the attackers were able to induce Let\u2019s Encrypt to issue legitimate TLS certificates that they could then install on mail servers, which then intercepted email sent to government email addresses.\u00a0 This is similar to the <a href=\"https:\/\/krebsonsecurity.com\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/\">DNSpionage attack of 2019<\/a>, in which suspected Iranian hackers used compromised registrar credentials to intercept email and VPN credentials from government agencies and companies across the Middle East.<\/p>\n<p>There are a few lessons DNS administrators should learn from this:\u00a0 First, use a registrar that requires multifactor authentication for customer accounts.\u00a0 There\u2019s simply no excuse today for not supporting MFA.\u00a0 If your registrar doesn\u2019t, <em>leave.<\/em><\/p>\n<p>Second, lock your domains.\u00a0 Depending on your registrar and the registry that manages your parent zone, there may be a few types of locks available to you.\u00a0 The registrar CSC has <a href=\"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/\">a writeup to help you understand the differences<\/a>, but the short answer is that a registry lock, if it\u2019s available, is more effective at preventing unauthorized changes to your domain\u2019s delegation.<\/p>\n<p>Finally, monitor the delegation to your critical domains.\u00a0 If you use MFA and a registry lock, you\u2019ll make it harder for a hacker to change your delegation.\u00a0 But if they manage to slip through these defenses, you\u2019ll want to know as quickly as possible.\u00a0 Monitoring your delegation is a good way to do this.\u00a0 And it isn\u2019t hard:\u00a0 You could whip up a script to run <em>dig NS &lt;your-domain&gt; <\/em>periodically against your parent zone\u2019s DNS servers and then compare the result with the NS records in the authoritative zone.\u00a0 Infoblox even includes a feature to do this in NIOS, called <a href=\"https:\/\/docs.infoblox.com\/display\/nios86\/Configuring+DNS+Integrity+Check+for+Authoritative+Zones\"><em>DNS Integrity Check<\/em><\/a>.\u00a0 It\u2019ll alert you if your zone\u2019s parents ever report a different set of NS records from those in NIOS\u2019s database.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I suppose the first thing DNS administrators should learn is what Tomiris is, since as of just a few days ago, I had no idea.\u00a0 Tomiris is malware recently identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT).\u00a0 Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":6962,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[574,575,30],"class_list":{"0":"post-7104","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-tomiris","9":"tag-dns-administration","10":"tag-dns","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Should DNS Administrators Learn from Tomiris?<\/title>\n<meta name=\"description\" content=\"What Should DNS Administrators Learn from Tomiris? I suppose the first thing DNS administrators should learn is what Tomiris is, since as of just a few days ago, I had no idea. Tomiris is malware recently identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT). Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably the compromise of registrar accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Should DNS Administrators Learn from Tomiris?\" \/>\n<meta property=\"og:description\" content=\"What Should DNS Administrators Learn from Tomiris? I suppose the first thing DNS administrators should learn is what Tomiris is, since as of just a few days ago, I had no idea. Tomiris is malware recently identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT). Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably the compromise of registrar accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-14T19:57:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-17T04:33:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"What Should DNS Administrators Learn from Tomiris?\",\"datePublished\":\"2021-10-14T19:57:29+00:00\",\"dateModified\":\"2021-10-17T04:33:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/\"},\"wordCount\":402,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"keywords\":[\"Tomiris\",\"DNS administration\",\"DNS\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/\",\"name\":\"What Should DNS Administrators Learn from Tomiris?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"datePublished\":\"2021-10-14T19:57:29+00:00\",\"dateModified\":\"2021-10-17T04:33:28+00:00\",\"description\":\"What Should DNS Administrators Learn from Tomiris? I suppose the first thing DNS administrators should learn is what Tomiris is, since as of just a few days ago, I had no idea. Tomiris is malware recently identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT). Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably the compromise of registrar accounts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"width\":612,\"height\":408,\"caption\":\"Cyber protection shield icon on server room background. Information Security and virus detection.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-should-dns-administrators-learn-from-tomiris\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Should DNS Administrators Learn from Tomiris?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Should DNS Administrators Learn from Tomiris?","description":"What Should DNS Administrators Learn from Tomiris? I suppose the first thing DNS administrators should learn is what Tomiris is, since as of just a few days ago, I had no idea. Tomiris is malware recently identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT). Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably the compromise of registrar accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/","og_locale":"en_US","og_type":"article","og_title":"What Should DNS Administrators Learn from Tomiris?","og_description":"What Should DNS Administrators Learn from Tomiris? I suppose the first thing DNS administrators should learn is what Tomiris is, since as of just a few days ago, I had no idea. Tomiris is malware recently identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT). Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably the compromise of registrar accounts.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/","og_site_name":"Infoblox Blog","article_published_time":"2021-10-14T19:57:29+00:00","article_modified_time":"2021-10-17T04:33:28+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"What Should DNS Administrators Learn from Tomiris?","datePublished":"2021-10-14T19:57:29+00:00","dateModified":"2021-10-17T04:33:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/"},"wordCount":402,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","keywords":["Tomiris","DNS administration","DNS"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/","url":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/","name":"What Should DNS Administrators Learn from Tomiris?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","datePublished":"2021-10-14T19:57:29+00:00","dateModified":"2021-10-17T04:33:28+00:00","description":"What Should DNS Administrators Learn from Tomiris? I suppose the first thing DNS administrators should learn is what Tomiris is, since as of just a few days ago, I had no idea. Tomiris is malware recently identified by researchers at Kaspersky\u2019s Global Research and Analysis Team (GReAT). Tomiris is relevant to DNS administrators because it spread by capitalizing on what was probably the compromise of registrar accounts.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","width":612,"height":408,"caption":"Cyber protection shield icon on server room background. Information Security and virus detection."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-should-dns-administrators-learn-from-tomiris\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What Should DNS Administrators Learn from Tomiris?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7104"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7104\/revisions"}],"predecessor-version":[{"id":7117,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7104\/revisions\/7117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6962"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}