{"id":7899,"date":"2022-07-26T14:51:30","date_gmt":"2022-07-26T21:51:30","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7899"},"modified":"2022-07-12T15:09:48","modified_gmt":"2022-07-12T22:09:48","slug":"cybersecurity-threats-to-managed-security-providers-and-their-customers","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/","title":{"rendered":"Cybersecurity Threats to Managed Security Providers and Their Customers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cybersecurity authorities of the United Kingdom (NCSC-UK), Australia (ACSC), Canada (CCCS), New Zealand (NCSC-NZ), and the United States (CISA), (NSA), (FBI) issued a joint Cybersecurity Advisory (CSA) <\/span><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-131a\"><span style=\"font-weight: 400;\">AA22-131A<\/span><\/a><span style=\"font-weight: 400;\"> overviewing the threats to MSPs the potential impacts to their customers. This CSA provides actions MSPs and their customers can take to reduce their risk of falling victim to a cyber intrusion. This advisory describes cybersecurity best practices for securing sensitive data within information and communications technology (ICT) services for MSPs and their customers. The advisory recommends that organizations should implement these guidelines as appropriate, and in compliance with applicable regulations. MSP customers should verify that the contractual arrangements with their services provider for cybersecurity include the measure to address these risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MSPs deliver, operate, or manage ICT services and functions for their customers via a contractual arrangement, such as a service level agreement. In addition to offering their own services, an MSP may offer services in conjunction with those of other providers. Services offerings may include platform, software, and IT infrastructure services; business process and support functions; and cybersecurity services.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MSPs generally provide services that usually require both trusted network connectivity and privileged access to and from customer systems. Many organizations use MSPs to manage ICT systems, store data, or support sensitive processes. Many organizations make use of MSPs to scale and support network environments and processes without expanding their internal staff or having to develop the capabilities internally.\u00a0<\/span><\/p>\n<h3><b>Threat Actors Targeting MSP Access to Customer Networks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Whether the customer&#8217;s network environment is on premises or externally hosted, threat actors can use a vulnerable MSP as an initial access vector to multiple victim networks, with globally cascading effects. The UK, Australian, Canadian, New Zealand, and U.S. cybersecurity authorities expect malicious cyber actors, including state-sponsored advanced persistent threat (APT) groups, to step up their targeting of MSPs in their efforts to exploit provider-customer network trust relationships. For example, threat actors successfully compromising an MSP could enable follow-on activity, such as ransomware and cyber espionage, against the MSP as well as across the MSP&#8217;s customer base.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The UK, Australian, Canadian, New Zealand, and U.S. cybersecurity authorities have previously issued general guidance for MSPs and their customers. This new advisory provides additional specific guidance to enable better communications between MSPs and their customers that center on securing sensitive information and data. This alert strongly suggests a re-evaluation of security processes and contractual commitments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Download the full government advisory <\/span><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-131a\"><span style=\"font-weight: 400;\">Protecting Against Cyber Threats to Managed Service Providers and their Customers.<\/span><\/a><\/p>\n<h3><b>Many Types of DNS-based Attacks can Threaten MSPs and their Customers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A DNS Attack is any attack targeting the availability or stability of a network\u2019s DNS service. Attacks that leverage DNS as its mechanism as part of its overall attack strategy, such as cache poisoning, are also considered DNS attacks. At the 1,000-foot view, there are attacks on DNS services which attack the DNS infrastructure itself, either rendering the DNS service itself unavailable or subverting the answers provided by the DNS servers. Like any other server, DNS servers are prone to all network-based attacks. There are many ways attackers can cause a large amount of network traffic to the DNS servers, such as TCP\/UDP\/ICMP floods, rendering the service unavailable to other network users by saturating the network link to the DNS servers. Attackers can also leverage a specific vulnerability in the DNS server software or host\u00a0<\/span><span style=\"font-weight: 400;\">operating system, to either bypass control measures to create rogue entries in the DNS database, or cause the DNS server to crash.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most types of malware rely on using DNS as part of their overall function to not only communicate with the command-and-control server, but to update and evolve itself. A prime example is the recent WannaCry ransomware, which relies on making an initial successful DNS query before it executes its attack.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DNS Tunneling is another attacker general technique (MITRE ATT&amp;CK Technique\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ID: T1071.004) that encodes messages in DNS queries and answers, mostly to evade detection. While there are legitimate uses of DNS Tunneling, where it gets serious is when someone uses it to exfiltrate data. This can be very difficult to detect, due to the ever-changing domain names, and the encoding-decoding schema chosen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here you can see an example of a DNS Tunnel &#8211; B1txor20 Linux Botnet. This was first observed propagating through Log4j in February 2022. This uses DNS tunneling to register with and execute commands sent by C2 servers. Sensitive information hidden using specific encrypting\/encoding techniques (Zlib compress, RC4 Encrypt, Base64) and sent to C2 server as a DNS request. C2 sends payload\/further instructions as a DNS response. 14 to 15 different C2 instructions were supported.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7900 alignleft\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/threats-to-security-providers-1.png\" alt=\"\" width=\"333\" height=\"301\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threats-to-security-providers-1.png 333w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threats-to-security-providers-1-300x271.png 300w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">You can learn more here <\/span><a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/1\/CSI_Selecting%20a%20Protective%20DNS%20Service_U00117652-21.PDF\"><span style=\"font-weight: 400;\">courtesy of the NSA<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Infoblox\u00a0 Secures Your Modern Enterprise\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Infoblox BloxOne Threat Defense helps protect an organization against today\u2019s sophisticated and ever evolving threats. BloxOne Threat Defense can reduce incident response time by automatically blocking malicious activity and provide the threat data to the rest of your SOAR and security ecosystem for fast investigation, quarantine and remediation. This can reduce the noise generated by your firewall and the overall number of alerts requiring review. To find out more about how <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">BloxOne Threat Defense<\/span><\/a><span style=\"font-weight: 400;\"> can help secure your network and data, please reach out to us via <\/span><a href=\"https:\/\/info.infoblox.com\/contact-form\/\"><span style=\"font-weight: 400;\">https:\/\/info.infoblox.com\/contact-form\/<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Don\u2019t be the last to know! The June 2021 <\/span><a href=\"https:\/\/info.infoblox.com\/resources-whitepapers-gartner-how-can-organizations-use-dns-to-improve-their-security-posture.html\"><span style=\"font-weight: 400;\">Gartner report<\/span><\/a><span style=\"font-weight: 400;\"> recommends organizations leverage DNS logs for threat detection and forensic purposes with their Security Information and Event Management platforms.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7683\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/shields-up.png\" alt=\"\" width=\"512\" height=\"137\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up-300x80.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Russia\u2019s invasion of Ukraine could impact organizations both within and beyond the region, to include <\/span><a href=\"https:\/\/www.cisa.gov\/uscert\/russia\"><span style=\"font-weight: 400;\">malicious cyber activity<\/span><\/a><span style=\"font-weight: 400;\"> against the U.S. homeland, including as a response to the unprecedented economic costs imposed on Russia by the U.S. and our allies and partners. Evolving intelligence indicates that the Russian Government is exploring options for potential cyberattacks. Every organization\u2014large and small\u2014must be prepared to respond to disruptive cyber incidents. As the nation\u2019s cyber defense agency, CISA stands ready to help organizations prepare for, respond to, and mitigate the impact of cyberattacks. When cyber incidents are reported quickly, we can use this information to render assistance and as a warning to prevent other organizations and entities from falling victim to a similar attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations should report anomalous cyber activity and\/or cyber incidents 24\/7 to report@cisa.gov or (888) 282-0870.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.\u00a0 The cybersecurity authorities of the United Kingdom (NCSC-UK), Australia (ACSC), Canada (CCCS), New Zealand (NCSC-NZ), and the United States (CISA), (NSA), (FBI) issued a joint [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":1635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[689,189,688,730,731,732,733,414,308,339,734,228],"class_list":{"0":"post-7899","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-managed-service-provider","9":"tag-cybersecurity","10":"tag-msp","11":"tag-ncsc-uk","12":"tag-acsc","13":"tag-cccs","14":"tag-ncsc-nz","15":"tag-nsa","16":"tag-fbi","17":"tag-apt","18":"tag-dns-attack","19":"tag-bloxone-threat-defense","20":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Threats to Managed Security Providers and Their Customers<\/title>\n<meta name=\"description\" content=\"Cybersecurity Threats to Managed Security Providers and Their Customers. Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Threats to Managed Security Providers and Their Customers\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Threats to Managed Security Providers and Their Customers. Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-26T21:51:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"Cybersecurity Threats to Managed Security Providers and Their Customers\",\"datePublished\":\"2022-07-26T21:51:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/\"},\"wordCount\":1108,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"keywords\":[\"Managed Service Provider\",\"Cybersecurity\",\"MSP\",\"NCSC-UK\",\"ACSC\",\"CCCS\",\"NCSC-NZ\",\"NSA\",\"FBI\",\"apt\",\"DNS Attack\",\"BloxOne\u00ae Threat Defense\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/\",\"name\":\"Cybersecurity Threats to Managed Security Providers and Their Customers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"datePublished\":\"2022-07-26T21:51:30+00:00\",\"description\":\"Cybersecurity Threats to Managed Security Providers and Their Customers. Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/cybersecurity-threats-to-managed-security-providers-and-their-customers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Threats to Managed Security Providers and Their Customers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Threats to Managed Security Providers and Their Customers","description":"Cybersecurity Threats to Managed Security Providers and Their Customers. Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Threats to Managed Security Providers and Their Customers","og_description":"Cybersecurity Threats to Managed Security Providers and Their Customers. Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/","og_site_name":"Infoblox Blog","article_published_time":"2022-07-26T21:51:30+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"Cybersecurity Threats to Managed Security Providers and Their Customers","datePublished":"2022-07-26T21:51:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/"},"wordCount":1108,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","keywords":["Managed Service Provider","Cybersecurity","MSP","NCSC-UK","ACSC","CCCS","NCSC-NZ","NSA","FBI","apt","DNS Attack","BloxOne\u00ae Threat Defense"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/","url":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/","name":"Cybersecurity Threats to Managed Security Providers and Their Customers","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","datePublished":"2022-07-26T21:51:30+00:00","description":"Cybersecurity Threats to Managed Security Providers and Their Customers. Recently, there has been an observed increase in malicious cyber activity targeting managed service providers (MSPs) and their customers. This is a trend which is expected to grow and continue.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/cybersecurity-threats-to-managed-security-providers-and-their-customers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Threats to Managed Security Providers and Their Customers"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7899"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7899\/revisions"}],"predecessor-version":[{"id":7903,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7899\/revisions\/7903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1635"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}