{"id":8913,"date":"2023-09-26T07:00:54","date_gmt":"2023-09-26T14:00:54","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8913"},"modified":"2024-04-26T13:31:31","modified_gmt":"2024-04-26T20:31:31","slug":"introducing-dns-threat-actors","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/","title":{"rendered":"Introducing DNS Threat Actors"},"content":{"rendered":"<p>Everyone loves a good whodunit. As the story of the recent attacks on MGM International and Caesars Entertainment unfolded, major news outlets competed to attribute an attacker to the ransomware that shut down a large portion of MGM operations. In the end, it looks like a threat actor called Scattered Spider leveraged the services of another threat actor called ALPHV, or BlackCat, to steal sensitive data and compel the company to disconnect networks from the internet.<sup>1<\/sup> The term actor is used to neutrally describe an entity which might be an individual, a company, a group, or a nation state. The security industry is rich with names for malicious actors and every organization in the field typically has their own naming conventions, which leads to multiple names like BlackCat and ALPHV for the same actor. Regardless of the naming convention, the names that are regularly reported are almost always associated with malware. In other words, the way in which malicious activity is attributed to an actor is deeply connected to what malware they use, how and where they deploy it, and the capabilities of the malware. When various malware or hacking campaigns can be tied back to an identity, it helps fulfill a natural desire to understand the motivations behind attacks \u2013 and it puts a name to the culprit.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/infoblox-threat-intelligence-threat-actors-v2.png\" \/><\/p>\n<p>At Infoblox, we also track malicious actors, but we have found that the actors we track rarely align with those reported by others in the industry. Since the vast majority of players in the security field, whether commercial, government agencies, or non-profit organizations, are focused on investigating malware, the reporting on the topic and its related actors is extensive. On the other hand, while over 90% of all malware leverages the domain name system (DNS) according to the National Security Agency (NSA), there are very few companies that specialize in DNS and even fewer that report research derived from DNS.<sup>2<\/sup> As a result, the actors who control the DNS infrastructure used in these attacks are rarely distinguished from the malware, when in reality they are often distinct.<\/p>\n<p>Just as Scattered Spider used ransomware specialist BlackCat to attack MGM, there are threat actors that provide DNS infrastructure, meaning domain names and hosting, to malware actors. The relationships between these domains and IP addresses may be difficult to recognize, and the infrastructure may be entirely separate from any specific malware. We specialize in tracking these relationships and term the actors who control DNS infrastructure for nefarious purposes <strong>DNS threat actors<\/strong>.<\/p>\n<p>While they have been around for decades, DNS threat actors are generally unrecognized in the security community. We find that these actors are often able to maintain a malicious infrastructure for years with little notice from security vendors; the domain names they control may even be considered \u201creputable\u201d in major open source reputation checkers. As an example, in July 2022, we published on VexTrio, a DNS threat actor that uses a dictionary domain generation algorithm (DDGA) to continually grow its network. At the time of that first publication, VexTrio had been operating for over two years to deliver different types of malware, adware, and scams. Since then, others have reported on the malware distributed by VexTrio, but without making the connection to VexTrio itself.<sup>3<\/sup> Because we are monitoring the VexTrio network from a DNS perspective, our customers are protected, independent of the malware. VexTrio domain names continue to be unrecognized by most security vendors because their focus is not DNS, but rather malware or phishing. Others capture the landing page, or the malware, but not the delivery itself. As of this writing, Infoblox has detected nearly 60,000 domain names controlled by VexTrio. Since our publication in 2022, some vendors have begun detecting VexTrio domains, e.g., trueworeover[.]live, as \u201cgreyware\u201d, but do not recognize the malicious nature of their activities.<\/p>\n<p>To shed light on these operations being executed in the shadows, we are introducing the concept of DNS threat actors and plan to publish reports on some of the actors we track. Monitoring DNS threat actors allows us to identify related infrastructure and detect new domains and IP addresses as they emerge. The use of a DNS detection and response (DNS-DR) system, like BloxOne Threat Defense, then allows us to block the distribution of malware, phishing, scams, and illegal content before they even reach the end user. We are also developing more ways for our customers to interact with our DNS threat actor data to find forensic insights related to their own network.<\/p>\n<p>Associating a type of malware or a campaign to a malware threat actor can sometimes be straightforward, but will oftentimes require sophisticated analysis. The same is true of DNS threat actors. In some cases, the DNS actor might use dedicated nameservers which persist over time, but more often, determining whether a domain name or IP address is controlled by an actor can be a complex process. For example, one way we were able to distinguish domains controlled by different actors using the Decoy Dog malware kit was to use DNS logs to statistically identify the sleep time they had configured for compromised devices. In another recent example, attacks using iMessage texts that contained fake package delivery notifications from the U.S. Postal Service were attributed to a Chinese actor and associated to a specific domain registrar and hosting service provider in open source reporting. From our DNS perspective, however, we had detected those lookalike phishing domains as part of a larger set of activities using additional registrars and hosting providers. As the originally reported activity was thwarted, we were able to observe them sending iMessage spam that contained other domains we had flagged. In this case, a combination of timing and domain name properties had led to our decision to group the domains together prior to the public reporting.<\/p>\n<p>Also, similar to the malware criminal underground, many of the DNS threat actors we track are unnamed. We begin with sets of related domains and IP addresses, and over time we build these into more sophisticated DNS threat actor profiles to be monitored and named. Our focus for long-term tracking is on actors who have persisted over a year, although there are some actors we track who have been active for shorter times. In some cases we can determine the types of malicious activity the actor\u2019s network is supporting. We maintain knowledge of over 30k sets of related indicators today.<\/p>\n<p>While we are announcing DNS threat actors as a category today, tracking them is nothing new for us. We have had DNS signatures in place since 2018 to monitor the evolution of certain actors\u2019 infrastructure. Early algorithms detected newly registered domains used by the actors behind the Magnitude exploit kit and Hancitor malware, as well as specific DNS actors responsible for Slow Drip distributed denial of service (DDoS) attacks. Because we were able to predict the use of these domains, we confidently blocked their resolution at the DNS recursive resolver, protecting our customers before the actors could leverage them in their campaigns.<\/p>\n<p>We have published on several DNS threat actors, none of which align directly with known malware actors, and all of which have persisted in their activities for over a year. While each of these actors have been confirmed to deliver malware, DNS threat actors play a number of different roles in the online crime economy and use a wide range of techniques to accomplish their goals.<\/p>\n<ul>\n<li>VexTrio is a persistent actor that leverages a dictionary domain generation algorithm (DDGA). We call them the \u201cswiss army knife\u201d of DNS actors because they are known to deliver multiple kinds of malware, scams, ads, and even spearphishing attacks. They have been around for more than three years and continually grow their network. VexTrio is known to hack vulnerable WordPress sites and has been observed in over 50% of all networks. You can read about them in our original report <strong><a href=\"\/cyber-threat-intelligence\/cyber-threat-advisory\/vextrio-ddga-domains-spread-adware-spyware-and-scam-web-forms\/\">here<\/a><\/strong> and an update <strong><a href=\"\/cyber-threat-intelligence\/cyber-threat-advisory\/vextrio-deploys-dns-based-tds-server\/\">here<\/a><\/strong>.<\/li>\n<li>Omnatuor is similar to VexTrio, but does not use a DDGA to create domains. The domains will be categorized in web search results as greyware, nuisance-ware, or adware. But, just like VexTrio, it delivers malware to select targets. Omnatuor has over 14k associated domains and a reach similar to VexTrio. You can read our report on them <strong><a href=\"\/cyber-threat-intelligence\/cyber-threat-advisory\/vast-malvertising-network-hijacks-browser-settings-to-spread-riskware\/\">here<\/a><\/strong>.<\/li>\n<li>WordyThief was a prolific spam actor that distributed Russian-developed Predator the Thief and Taurus Stealer malware.<sup>4<\/sup> We published a paper on WordyThief at eCrimeX, an annual research conference sponsored by the Anti-Phishing Working Group (APWG). WordyThief was active for over a year, but is now dormant or has changed their tactics, techniques, and procedures (TTPs). You can read about them <strong><a href=\"https:\/\/docs.apwg.org\/ecrimeresearch\/2020\/56_Wordythief-AMaliciousSpammer_20201028.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a><\/strong>.<\/li>\n<li>WhiteSawShark is a malicious spam actor discovered in 2020 and who is still active today. They deliver different types of information stealers that are widely available, but use a custom downloader. We reported on both the malicious spam infrastructure and the downloader they were using at the time in 2021. You can read that report <strong><a href=\"\/cyber-threat-intelligence\/infoblox-identifies-new-threat-actor-whitesawshark-and-new-malware-hadloader\/\">here<\/a><\/strong>.<\/li>\n<\/ul>\n<p>Soon we will begin sharing details of select other DNS threat actors. Their portfolios will demonstrate the breadth of DNS threat actor TTPs and highlight their ability to operate with impunity. It will also show how DNS provides a unique lens on the complex economy that fuels malicious actors, from scamming vulnerable populations of their paycheck to stealing state secrets. Individuals and enterprises both will likely be surprised by the amount of suspicious and malicious domain resolution queries made within their network that pass through other security products unnoticed. One of the common tactics used by DNS threat actors is the registration of large numbers of domain names that they created using a domain generation algorithm, a method we\u2019re referring to as RDGA, or registered DGA. In our next blog, we\u2019ll talk a little bit more about RDGAs and how they are used.<\/p>\n<h3 style=\"font-size:18px;\">Endnotes<\/h3>\n<ol style=\"font-size:14px;\">\n<li><strong><a href=\"https:\/\/www.vox.com\/technology\/2023\/9\/15\/23875113\/mgm-hack-casino-vishing-cybersecurity-ransomware\" target=\"_blank\" rel=\"noopener\">https:\/\/www.vox.com\/technology\/2023\/9\/15\/23875113\/mgm-hack-casino-vishing-cybersecurity-ransomware<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2020\/06\/nsa-piloting-secure-domain-name-system-service-defense-contractors\/166248\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.nextgov.com\/cybersecurity\/2020\/06\/nsa-piloting-secure-domain-name-system-service-defense-contractors\/166248\/<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.nozominetworks.com\/blog\/tracking-malicious-glupteba-activity-through-the-blockchain\" target=\"_blank\" rel=\"noopener\">https:\/\/www.nozominetworks.com\/blog\/tracking-malicious-glupteba-activity-through-the-blockchain<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/outpost24.com\/blog\/an-in-depth-analysis-of-the-new-taurus-stealer\/\" target=\"_blank\" rel=\"noopener\">https:\/\/outpost24.com\/blog\/an-in-depth-analysis-of-the-new-taurus-stealer\/<\/a><\/strong><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Everyone loves a good whodunit. As the story of the recent attacks on MGM International and Caesars Entertainment unfolded, major news outlets competed to attribute an attacker to the ransomware that shut down a large portion of MGM operations. In the end, it looks like a threat actor called Scattered Spider leveraged the services of [&hellip;]<\/p>\n","protected":false},"author":338,"featured_media":9924,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[893,30,740,32,894,895,774,505,896,913,914,40,361,892,286,915,228],"class_list":{"0":"post-8913","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-domain-name-system","9":"tag-dns","10":"tag-protective-dns","11":"tag-malware","12":"tag-indicators","13":"tag-information-security","14":"tag-malvertising","15":"tag-adware","16":"tag-dns-detection-response","17":"tag-threat-actor","18":"tag-malicious-actor","19":"tag-threat-intelligence","20":"tag-network-security","21":"tag-domain-generation-algorithm","22":"tag-dga","23":"tag-rdga","24":"tag-bloxone-threat-defense","25":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Introducing DNS Threat Actors | Infoblox<\/title>\n<meta name=\"description\" content=\"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing DNS Threat Actors | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T14:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:31:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ren\u00e9e Burton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Introducing DNS Threat Actors | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ren\u00e9e Burton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/\"},\"author\":{\"name\":\"Ren\u00e9e Burton\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d18b8543afa21fac6c03151b6f31f981\"},\"headline\":\"Introducing DNS Threat Actors\",\"datePublished\":\"2023-09-26T14:00:54+00:00\",\"dateModified\":\"2024-04-26T20:31:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/\"},\"wordCount\":1662,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"keywords\":[\"Domain Name System\",\"DNS\",\"Protective DNS\",\"Malware\",\"indicators\",\"information security\",\"malvertising\",\"adware\",\"DNS Detection &amp; Response\",\"threat actor\",\"malicious actor\",\"Threat Intelligence\",\"Network Security\",\"Domain Generation Algorithm\",\"DGA\",\"RDGA\",\"BloxOne\u00ae Threat Defense\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/\",\"name\":\"Introducing DNS Threat Actors | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"datePublished\":\"2023-09-26T14:00:54+00:00\",\"dateModified\":\"2024-04-26T20:31:31+00:00\",\"description\":\"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"width\":612,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/introducing-dns-threat-actors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introducing DNS Threat Actors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d18b8543afa21fac6c03151b6f31f981\",\"name\":\"Ren\u00e9e Burton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_338_1592324402-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_338_1592324402-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_338_1592324402-96x96.jpg\",\"caption\":\"Ren\u00e9e Burton\"},\"description\":\"Dr. Burton is the Vice President of Threat Intel for Infoblox. She is a subject matter expert in DNS-based threats and leads the algorithm development and research in DNS intelligence.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/renee-burton\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introducing DNS Threat Actors | Infoblox","description":"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/","og_locale":"en_US","og_type":"article","og_title":"Introducing DNS Threat Actors | Infoblox","og_description":"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/","og_site_name":"Infoblox Blog","article_published_time":"2023-09-26T14:00:54+00:00","article_modified_time":"2024-04-26T20:31:31+00:00","og_image":[{"width":612,"height":405,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","type":"image\/jpeg"}],"author":"Ren\u00e9e Burton","twitter_card":"summary_large_image","twitter_title":"Introducing DNS Threat Actors | Infoblox","twitter_description":"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.","twitter_misc":{"Written by":"Ren\u00e9e Burton","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/"},"author":{"name":"Ren\u00e9e Burton","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d18b8543afa21fac6c03151b6f31f981"},"headline":"Introducing DNS Threat Actors","datePublished":"2023-09-26T14:00:54+00:00","dateModified":"2024-04-26T20:31:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/"},"wordCount":1662,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","keywords":["Domain Name System","DNS","Protective DNS","Malware","indicators","information security","malvertising","adware","DNS Detection &amp; Response","threat actor","malicious actor","Threat Intelligence","Network Security","Domain Generation Algorithm","DGA","RDGA","BloxOne\u00ae Threat Defense"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/","name":"Introducing DNS Threat Actors | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","datePublished":"2023-09-26T14:00:54+00:00","dateModified":"2024-04-26T20:31:31+00:00","description":"Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","width":612,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/introducing-dns-threat-actors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Introducing DNS Threat Actors"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d18b8543afa21fac6c03151b6f31f981","name":"Ren\u00e9e Burton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_338_1592324402-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_338_1592324402-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_338_1592324402-96x96.jpg","caption":"Ren\u00e9e Burton"},"description":"Dr. Burton is the Vice President of Threat Intel for Infoblox. She is a subject matter expert in DNS-based threats and leads the algorithm development and research in DNS intelligence.","url":"https:\/\/www.infoblox.com\/blog\/author\/renee-burton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/338"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8913"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8913\/revisions"}],"predecessor-version":[{"id":9173,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8913\/revisions\/9173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/9924"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}