{"id":7573,"date":"2022-03-23T11:28:20","date_gmt":"2022-03-23T18:28:20","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7573"},"modified":"2022-03-25T09:40:31","modified_gmt":"2022-03-25T16:40:31","slug":"mitre-attck-and-dns","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/","title":{"rendered":"MITRE ATT&#038;CK and DNS"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The MITRE ATT&amp;CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&amp;CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corp. in 2015.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As an important knowledge base, MITRE ATT&amp;CK enables anyone on the cyber defense team to review and contrast attacker activity, and then understand the best options for defense. So you know, there is also MITRE PRE-ATT&amp;CK, which helps cyber defenders prevent an attack before the attacker can gain access to the network. The 15 top-level tactic categories for PRE-ATT&amp;CK correlate to the first two stages of the Lockheed Martin Cyber Kill Chain\u00ae.\u00a0 PRE-ATT&amp;CK presents the tactics, underlying techniques, and procedures that a cyber attacker will use to define targets, gather information, and then launch an attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> Given the greatly increased porosity of the perimeter, the movement to the cloud and mobile devices, and the greater ability of attackers to morph and change tools that were previously found by static signatures, it is likely that at some point an attacker will successfully penetrate your network. Given this assumption, a detailed focus on attacker behavior, such as provided by MITRE ATT&amp;CK, is the best way to find and stop an ongoing attack before data exfiltration or destructive behavior can be achieved.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MITRE ATT&amp;CK brings a common lexicon to describe the activities of cyber attackers, and the step-by-step tactics and techniques which they will use. This enables you to communicate clearly with others in the cyber defense community on the exact details of the threat. ATT&amp;CK also provides a strong framework for describing your current security controls and processes. At a very basic level, MITRE ATT&amp;CK allows the security operations defenders to clearly identify the nature of a threat, map that threat back to the controls that should protect against it, and then ultimately determine whether or not that control is effective.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sources of reliable data used by MITRE to develop the knowledge base included malware samples, security conference presentations, threat intelligence reporting, and a variety of other public and private sources including social media, blogs, and webinars.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Red teams and the techniques that they use have also been an excellent source of data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The MITRE ATT&amp;CK framework provides a comprehensive taxonomy to post-exploitation cyber attacker behavior. A detailed focus on attacker behavior, such as provided by MITRE ATT&amp;CK, is the best way to find and stop an ongoing attack before data exfiltration or destructive behavior can be achieved. This helps you balance your defensive measures against the steps an attacker will take.\u00a0 The end goal in using MITRE ATT&amp;CK is to make better decisions about assessing risks, deploying new security controls, and better defending your network.\u00a0 MITRE ATT&amp;CK has segmented attacks in a very consistent way that makes it easy to compare them and to determine how an attacker might have exploited your network.\u00a0 Most attacker analysis focuses on their activities in terms of perimeter defense. MITRE ATT&amp;CK takes a much closer look at them once they get in.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7574 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-1.png\" alt=\"\" width=\"898\" height=\"456\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1-300x152.png 300w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">MITRE ATT&amp;CK is presented as a series of easily navigable matrices that contain critical information about attacker behavior. This information includes attacker Tactics, Techniques (&amp; Sub-techniques) and Procedures.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7575 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-2.png\" alt=\"\" width=\"886\" height=\"467\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-2.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-2-300x158.png 300w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">This can be logically represented in the MITRE ATT&amp;CK matrix with column headings (Tactics), row entries under each column (Techniques), and the steps the attacker takes to execute one technique, or perhaps to string together a bunch of techniques. These steps are called the Procedures. Together these represent the Tactics, Techniques, and Procedures (TTP\u2019s) of the attacker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now we can look at all of the Tactics, one at a time, and determine which techniques &amp; sub-techniques utilize or rely on DNS to move the attacker closer to their goals. Here is the full list of MITRE ATT&amp;CK enterprise tactics in this graphic:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7576 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-3.png\" alt=\"\" width=\"886\" height=\"476\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-3.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-3-300x161.png 300w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Now lets focus in on those that impact or touch DNS in any way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here is just the Reconnaissance Tactic:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7577 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-4.png\" alt=\"\" width=\"886\" height=\"476\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-4.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-4-300x161.png 300w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">And here you can see which techniques under Reconnaissance utilize DNS.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7578 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-5.png\" alt=\"\" width=\"886\" height=\"476\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-5.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-5-300x161.png 300w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">This is the specific detail of these techniques &amp; sub-techniques provided by MITRE. You can see why you need a modernized DDI environment and why using DNS security is so important:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">T1590. Gathering Victim Network Information. Adversaries may gather information about the victim&#8217;s networks that can be used during targeting. Information about networks may include a variety of details, including administrative data (ex: IP ranges, domain names, etc.) as well as specifics regarding its topology and operations.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.001 Domain Properties. Adversaries may gather information about the victim&#8217;s network domain(s) that can be used during targeting. Information about domains and their properties may include a variety of details, including what domain(s) the victim owns as well as administrative data (ex: name, registrar, etc.) and more directly actionable information such as contacts (email addresses and phone numbers), business addresses, and name servers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.002 DNS. Adversaries may gather information about the victim&#8217;s DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target\u2019s subdomains, mail servers, and other hosts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.004 Network Topology. Adversaries may gather information about the victim&#8217;s network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and\/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.005 IP Addresses. Adversaries may gather the victim&#8217;s IP addresses that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses. Information about assigned IP addresses may include a variety of details, such as which IP addresses are in use. IP addresses may also enable an adversary to derive other details about a victim, such as organizational size, physical location(s), Internet service provider, and or where\/how their publicly-facing infrastructure is hosted.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">T1598. Phishing for Information. Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from <\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\"><span style=\"font-weight: 400;\">Phishing<\/span><\/a><span style=\"font-weight: 400;\"> in that the objective is gathering data from the victim rather than executing malicious code.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.003 Spearphishing Link. Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: <\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1585\"><span style=\"font-weight: 400;\">Establish Accounts<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/attack.mitre.org\/techniques\/T1586\"><span style=\"font-weight: 400;\">Compromise Accounts<\/span><\/a><span style=\"font-weight: 400;\">) and\/or sending multiple, seemingly urgent messages.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Here are many of the other techniques which utilize or impact DNS.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7579 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-6.png\" alt=\"\" width=\"887\" height=\"471\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-6.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-6-300x159.png 300w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7580 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-7.png\" alt=\"\" width=\"887\" height=\"471\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-7.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-7-300x159.png 300w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7581 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-8.png\" alt=\"\" width=\"886\" height=\"471\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-8.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-8-300x159.png 300w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7582 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-9.png\" alt=\"\" width=\"887\" height=\"459\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-9.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-9-300x155.png 300w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7583 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-10.png\" alt=\"\" width=\"887\" height=\"459\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-10.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-10-300x155.png 300w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7584 aligncenter\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/mitre-attack-11.png\" alt=\"\" width=\"887\" height=\"480\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-11.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-11-300x162.png 300w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/p>\n<h3><b>DNS is Used in the Great Majority of Cyber Attacks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DNS is ubiquitous and frequently used as an attacker technique for malware infiltration and data exfiltration. Sooner or later malware must reach back to command &amp; control and DNS is used as a covert communication channel for this purpose. Attackers often use malicious domains and IP addresses that could already have a reputation and therefore be identified by threat intelligence. In many other cases the behavior of DNS queries, in context, can provide the essential clues that organizations need to identify and stop the attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Standard security controls and technologies such as next-gen firewalls, IPS, and gateways generally do not inspect DNS for detecting malicious communications. Often these security controls are unable to prevent specific attacks such as DNS data exfiltration. Most importantly, they are not able to detect the nuances associated with newly created malicious addresses and domains.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infoblox <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">BloxOne Threat Defense<\/span><\/a><span style=\"font-weight: 400;\"> enables security operations teams to leverage DNS to get the highest visibility into malicious activity so that the cyberattackers can be detected and shut down early in the kill chain of events. BloxOne Threat Defense integrates with Security Orchestration Automation and Remediation (SOAR) systems, ITSM solutions, vulnerability scanners and other security ecosystem tools to trigger remediation actions automatically when any malicious activity is detected. This helps speed up an organization\u2019s response to security events and provides rapid threat containment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about our programs and products, and how to better protect your DNS infrastructure,\u00a0 please reach out to us via <\/span><a href=\"https:\/\/info.infoblox.com\/contact-sales.html\"><span style=\"font-weight: 400;\">https:\/\/info.infoblox.com\/contact-sales.html<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.cisa.gov\/shields-up\"><span style=\"font-weight: 400;\">Shields Up | CISA<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, non-profits, and other organizations, large and small, across multiple sectors of the economy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">www.cisa.gov<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>The MITRE ATT&amp;CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&amp;CK (Adversarial [&hellip;]<\/p>\n","protected":false},"author":205,"featured_media":7574,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[519,253,665,307],"class_list":{"0":"post-7573","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-mitre","9":"tag-mitre-attck","10":"tag-cyber-attack","11":"tag-phishing","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>MITRE ATT&amp;CK and DNS<\/title>\n<meta name=\"description\" content=\"MITRE ATT&amp;CK and DNS. The MITRE ATT&amp;CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&amp;CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corp. in 2015.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE ATT&amp;CK and DNS\" \/>\n<meta property=\"og:description\" content=\"MITRE ATT&amp;CK and DNS. The MITRE ATT&amp;CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&amp;CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corp. in 2015.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-23T18:28:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-25T16:40:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jamison Utter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamison Utter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/\"},\"author\":{\"name\":\"Jamison Utter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\"},\"headline\":\"MITRE ATT&#038;CK and DNS\",\"datePublished\":\"2022-03-23T18:28:20+00:00\",\"dateModified\":\"2022-03-25T16:40:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/\"},\"wordCount\":1524,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/mitre-attack-1.png\",\"keywords\":[\"MITRE\",\"MITRE ATT&amp;CK\",\"Cyber attack\",\"Phishing\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/\",\"name\":\"MITRE ATT&CK and DNS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/mitre-attack-1.png\",\"datePublished\":\"2022-03-23T18:28:20+00:00\",\"dateModified\":\"2022-03-25T16:40:31+00:00\",\"description\":\"MITRE ATT&CK and DNS. The MITRE ATT&CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corp. in 2015.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/mitre-attack-1.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/mitre-attack-1.png\",\"width\":512,\"height\":260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/mitre-attck-and-dns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"MITRE ATT&#038;CK and DNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/da37651b5ec3cc8dd7ca8191eba7295d\",\"name\":\"Jamison Utter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_205_1648057067-96x96.jpg\",\"caption\":\"Jamison Utter\"},\"description\":\"Jamison brings 25+ years of IT\\\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\\\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jamison-utter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"MITRE ATT&CK and DNS","description":"MITRE ATT&CK and DNS. The MITRE ATT&CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corp. in 2015.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/","og_locale":"en_US","og_type":"article","og_title":"MITRE ATT&CK and DNS","og_description":"MITRE ATT&CK and DNS. The MITRE ATT&CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corp. in 2015.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/","og_site_name":"Infoblox Blog","article_published_time":"2022-03-23T18:28:20+00:00","article_modified_time":"2022-03-25T16:40:31+00:00","og_image":[{"width":512,"height":260,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1.png","type":"image\/png"}],"author":"Jamison Utter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamison Utter","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/"},"author":{"name":"Jamison Utter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d"},"headline":"MITRE ATT&#038;CK and DNS","datePublished":"2022-03-23T18:28:20+00:00","dateModified":"2022-03-25T16:40:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/"},"wordCount":1524,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1.png","keywords":["MITRE","MITRE ATT&amp;CK","Cyber attack","Phishing"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/","url":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/","name":"MITRE ATT&CK and DNS","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1.png","datePublished":"2022-03-23T18:28:20+00:00","dateModified":"2022-03-25T16:40:31+00:00","description":"MITRE ATT&CK and DNS. The MITRE ATT&CK\u2122 framework, developed by The MITRE Corporation, is a comprehensive knowledge base of cyber attacker tactics and techniques gathered from actual observation of attacker behavior. The MITRE Corporation is a nonprofit organization which was founded in 1958. MITRE does work for U.S. Government agencies in a wide variety of areas. MITRE ATT&CK (Adversarial Tactics, Techniques, And Common Knowledge) was developed and released by Mitre Corp. in 2015.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/mitre-attack-1.png","width":512,"height":260},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/mitre-attck-and-dns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"MITRE ATT&#038;CK and DNS"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/da37651b5ec3cc8dd7ca8191eba7295d","name":"Jamison Utter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_205_1648057067-96x96.jpg","caption":"Jamison Utter"},"description":"Jamison brings 25+ years of IT\/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT\/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer\u2019s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike. He lives a thousand feet above Denver, Colorado with his wife Sarah and dog Sookie. Jamison is an avid martial artist, nature enthusiast, guitar player, and freemason.","url":"https:\/\/www.infoblox.com\/blog\/author\/jamison-utter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7573"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7573\/revisions"}],"predecessor-version":[{"id":7590,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7573\/revisions\/7590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7574"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}