{"id":7812,"date":"2022-06-06T00:02:24","date_gmt":"2022-06-06T07:02:24","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7812"},"modified":"2024-04-26T13:20:03","modified_gmt":"2024-04-26T20:20:03","slug":"executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/","title":{"rendered":"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms"},"content":{"rendered":"<h3><strong>Author: Christopher Kim<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3><strong>Executive summary<\/strong><\/h3>\n<p>Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content. This attack is widespread and impacts targets across many industries. From 1 to 12 May 2022, we detected more than 770,000 DNS queries to these domains, in approximately 50% of our cloud customer networks, across 24 industries. Based on the age of the domains, we judge that the threat actors have been conducting these campaigns for at least 13 months. For reporting and tracking purposes, we call this DDGA family and activity VexTrio.<\/p>\n<p>We are releasing a new Cyber Threat Advisory (CTA) today providing a comprehensive analysis of the actor\u2019s infrastructure and operations. This work is the result of in-depth analysis of DNS events, associated registration data, and the fraudulent content. Our paper details the attack chain and reveals a number of the techniques, tactics, and procedures (TTP) used by the actor, as well as impact on various industries. Additionally, we are releasing 38,000 domains and IPs related to Vextrio to our GitHub Repository for use by the security community.<\/p>\n<p>VexTrio actors heavily use domains and the DNS protocol to operate their campaigns. The actors leverage vulnerable WordPress websites as attack vectors to serve fraudulent content to unknowing website visitors. To accomplish this, they first detect websites that show cross-site scripting (XSS) vulnerabilities in WordPress themes or plugins, then inject malicious JavaScript code into them. When victims visit these websites, they are led to a landing web page that hosts fraudulent content, via one or more intermediary redirect domains that are also controlled by the actors. Additionally, as a means to avoid detection, the actors have integrated several features into their JavaScript and require the following conditions from the user to trigger the redirect:<\/p>\n<ul>\n<li>The user must visit the WordPress website from a search engine. For example, the referrer URL can be <em><a href=\"https:\/\/www.google.com\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.google.com\/<\/a><\/em>.<\/li>\n<li>Cookies are enabled in the user\u2019s web browser.<\/li>\n<li>The user has not visited a VexTrio compromised web page in the past 24 hours.<\/li>\n<\/ul>\n<p>The network infrastructure that supports the campaigns is stable, although it continually adds new domains, and the actors have been using it, including its IPs and nameservers, for over a year. VexTrio actors use a relatively small number of fraudulent redirect domains in their campaigns to conditionally lead victims to landing web pages that use DDGA domains. In some cases, we\u2019ve observed the DDGA domain act as an intermediary redirect, or pass the victim onto a decoy landing page if they didn\u2019t fit their profile. The naming convention of the DDGA domains has also been consistent: it shows three words delimited with a hyphen or not delimited at all. So far, we have observed the following naming formats across all second-level domains:<\/p>\n<ul>\n<li><em>{firstword}{secondword}{thirdword}.tld<\/em><\/li>\n<li><em>{firstword}{secondword}-{thirdword}.tld<\/em><\/li>\n<li><em>{firstword}-{secondword}-{thirdword}.tld<\/em><\/li>\n<\/ul>\n<p>By analyzing all of the VexTrio DDGA domains we\u2019ve discovered so far, we were able to determine the dictionary that VexTrio uses to generate DDGA domains. We have developed analytics to detect multiple components of the attack chain: compromised WordPress websites, intermediary fraudulent redirect domains, and DDGA domains. To disrupt customer DNS queries to the VexTrio components, we append relevant network indicators to Infoblox DNS response policy zone (RPZ) feeds.<\/p>\n<p>For more detailed information <a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/\">click here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Christopher Kim &nbsp; Executive summary Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content. This attack is widespread and impacts targets across many industries. From [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":7817,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[360,381,709,527,701],"class_list":{"0":"post-7812","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-dns-security","9":"tag-exploit","10":"tag-vextrio","11":"tag-vulnerability","12":"tag-zerologon","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms<\/title>\n<meta name=\"description\" content=\"Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms\" \/>\n<meta property=\"og:description\" content=\"Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-06T07:02:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"323\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms\",\"datePublished\":\"2022-06-06T07:02:24+00:00\",\"dateModified\":\"2024-04-26T20:20:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/\"},\"wordCount\":584,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"keywords\":[\"DNS Security\",\"exploit\",\"VexTrio\",\"vulnerability\",\"zerologon\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/\",\"name\":\"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"datePublished\":\"2022-06-06T07:02:24+00:00\",\"dateModified\":\"2024-04-26T20:20:03+00:00\",\"description\":\"Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg\",\"width\":612,\"height\":323,\"caption\":\"FRAUD Button on Computer Keyboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms","description":"Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms","og_description":"Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/","og_site_name":"Infoblox Blog","article_published_time":"2022-06-06T07:02:24+00:00","article_modified_time":"2024-04-26T20:20:03+00:00","og_image":[{"width":612,"height":323,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms","datePublished":"2022-06-06T07:02:24+00:00","dateModified":"2024-04-26T20:20:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/"},"wordCount":584,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","keywords":["DNS Security","exploit","VexTrio","vulnerability","zerologon"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/","name":"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","datePublished":"2022-06-06T07:02:24+00:00","dateModified":"2024-04-26T20:20:03+00:00","description":"Since February 2022, Infoblox\u2019s Threat Intelligence Group (TIG) has been tracking malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to run scams and spread riskware, spyware, adware, potentially unwanted programs, and pornographic content.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms.jpg","width":612,"height":323,"caption":"FRAUD Button on Computer Keyboard"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/executive-summary-vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Executive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7812"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7812\/revisions"}],"predecessor-version":[{"id":9906,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7812\/revisions\/9906"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7817"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}