{"id":9150,"date":"2023-11-06T06:00:27","date_gmt":"2023-11-06T13:00:27","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9150"},"modified":"2024-04-26T13:57:57","modified_gmt":"2024-04-26T20:57:57","slug":"malicious-dns-in-the-news","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/","title":{"rendered":"Malicious DNS in the News"},"content":{"rendered":"<h3>DNS for Early Threat Detection &#8211; Lumma C2<\/h3>\n<p>Only a few years ago, threat intelligence data on malicious domains provided a window of protection during which malware was still actively being spread. Protection could be afforded to many organizations by blocking the malicious domains that were published. Over time, threat actor techniques have evolved to the point where much of the potential damage and compromise is done long before any of the malicious domains are identified and propagated through open source intelligence (OSINT) (and most commercially available threat intel feeds). Threat actors are leveraging speed of execution to gain advantage and defenders need to respond accordingly.<\/p>\n<p>Our DNS Early Detection Program highlights and showcases the findings of Infoblox proprietary techniques that provide the earliest possible identification of potentially malicious domains. The program publishes our recent analysis of public OSINT disclosures of malicious domains compared against our early identification of these domains as suspicious.<\/p>\n<p>The <em><strong>NEED FOR SPEED<\/strong><\/em> is real. Infoblox identification of these suspicious domains makes them available for blocking weeks, even months, earlier than the domains published in many industry-wide malicious threat intel feeds.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td>The data shows that Infoblox suspicious domain threat intel feeds identified 37 Lumma malicious domains, on average, 62.1 days sooner than availability in OSINT. Infoblox\u2019s suspicious domain data can help our customers avoid a potentially devastating data breach.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Lumma C2 Stealer (Lumma)<\/h3>\n<p>Lumma is an information stealer that has been attributed to the threat actor \u201cShamel\u201d operating under the alias of Lumma. Lumma is available for purchase on Russian speaking Dark web forums as malware-as-a-service (MaaS). MaaS access to Lumma provides even the most inexperienced threat actors with an inexpensive way to gain access to relatively sophisticated and dangerous tools.<\/p>\n<p>The nature of how Lumma is packaged and presented as almost any standard commercial product might be at times appears surreal. Lumma is sold in various \u201cplans\u201d that include log upload and log analysis. Then optionally, depending on the plan selected, the user may also license the use of special log and traffic analysis tools, and, in the high end \u201cCorporate\u201d version, a feature which includes the ability to bypass many types of proactive defensive protections. The pricing for these plans runs between $250 to $1,000 U.S.<\/p>\n<p>The Lumma payload is typically distributed via spear phishing campaigns with malicious attachments, and malvertising campaigns with embedded malicious links. Lumma steals system data and sensitive information from infected machines, including browser data,<sup>1<\/sup> stored credentials and cryptocurrency data,<sup>2<\/sup> as well as two-factor authentication browser extensions.<sup>3<\/sup><\/p>\n<h3>Analysis and Methodology<\/h3>\n<p>In late September, 2023, data on 85 Lumma domains was published in OSINT. Analysis of these malicious domains was done by the Infoblox team to determine if they were identified earlier by our suspicious domain feeds.<\/p>\n<p>Each malicious domain identified in OSINT was researched in the Infoblox Dossier portal by our team. We reviewed our timeline feature to extract the earliest dates associated with Infoblox suspicious designation. We also extracted the WHOIS information for additional context.<\/p>\n<p>The conclusions of our analysis were definitive:<\/p>\n<ul>\n<li><strong>37 Lumma domains<\/strong> were identified as suspicious by Infoblox an average of <strong>62.1 days<\/strong> prior to the availability of the OSINT designation as malicious.<\/li>\n<li><strong>43%<\/strong> of these suspicious domains were blocked between <strong>72 and 90 days<\/strong> earlier than the OSINT designation as malicious.<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/infoblox-blog-malicious-dns-in-the-news-lumma-infostealer-identified.png\" \/><\/p>\n<p>It is often the case that OSINT publication dates may sometimes be unclear or lack precision. The dates of published articles by reputable 3rd parties may not always accurately reflect the OSINT availability of each individual domain.<\/p>\n<p>To provide context on the performance of our suspicious threat intel feeds we extracted WHOIS dates and found that 33 of the Lumma C2 infostealer domains were blocked as suspicious within an average of 2.5 days (60 hours) after the WHOIS domain registration date. The WHOIS dates are always precise and provide another perspective on the high value of suspicious threat intel feed content.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/infoblox-blog-malicious-dns-in-the-news-lumma-infostealer-identified-two.png\" \/><\/p>\n<h3 style=\"margin-bottom:20px;\">Risk Reduction and Return on Investment<\/h3>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td>Infoblox finds potentially dangerous DNS domains faster. Infoblox suspicious domain data can reduce risk and increase the return on investment for your threat intelligence program.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The use of our proprietary technology to identify suspicious domains is a major \u201cShift Left\u201d to normal processes used across the industry to develop and leverage threat intelligence information. Infoblox suspicious domain data helps security operations teams gain the timely information they need to better address and defeat the barrage of new threats before they can cause harm.<\/p>\n<h3>For Additional Information<\/h3>\n<p>The Infoblox Threat Intelligence Group provides fast access to accurate, contextual threat alerts and reports sourced from our own real-time research teams. Infoblox allows your team to leverage the high value of suspicious domain threat intelligence while ensuring unified security policy across your entire security infrastructure. Infoblox threat data minimizes false positives, so you can be confident in what you are blocking.<\/p>\n<p>To learn more about suspicious domains and DNS early detection: <strong><a href=\"https:\/\/www.infoblox.com\/threat-intel\/\">https:\/\/www.infoblox.com\/threat-intel\/<\/a><\/strong><\/p>\n<p>To learn more about BloxOne Threat Defense:<br \/>\n<strong><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/a><\/strong><\/p>\n<p>To learn more about Advanced DNS Protection:<br \/>\n<strong><a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/\">https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/<\/a><\/strong><\/p>\n<p>To learn more about the National Security Agency (NSA) and Cybersecurity &amp; Infrastructure Security Agency (CISA) guidance on Protective DNS:<br \/>\n<strong><a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF\">https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF<\/a><\/strong><\/p>\n<h3 style=\"font-size:18px;\">Endnotes<\/h3>\n<ol style=\"font-size:14px;\">\n<li>Targeted browsers include: Chrome, Chromium, Edge, Kometa, Vivaldi, Brave-Browser, Opera Stable, Opera GX Stable, Opera Neon, and Mozilla Firefox.<\/li>\n<li>Targeted crypto wallet extensions include: Metamask, BitApp, Sollet, Nash Extension, TronLink, iWit, Auro, Hycon Lite Client, Ronnin Wallet, Wombat, Polymesh, ZilPay, Binance Chain Wallet, MEW CX, ICONex, Coin98, Yoroi, Guild, Nabox, Cyano, Nifty, Saturn, KHC, Byone, Math, NeoLine, Temple, OneKey, Coinbase, Clove, TezBox, Leaf, Guarda, Liquality, DAppPlay, EQUAL, Terra Station, BitClip, Jaxx Liberty, Kepin, and Steem Keychain.<\/li>\n<li>Targeted two-factor authentication (WFA) extensions include: Authenticator, Authy, EOS Authenticator, GAuth Authenticator, and Trezor Password Manager.<\/li>\n<\/ol>\n<style>\n.calloutbox td {\ntext-align:center;\n}\n<\/style>\n","protected":false},"excerpt":{"rendered":"<p>DNS for Early Threat Detection &#8211; Lumma C2 Only a few years ago, threat intelligence data on malicious domains provided a window of protection during which malware was still actively being spread. Protection could be afforded to many organizations by blocking the malicious domains that were published. Over time, threat actor techniques have evolved to [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":9934,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[40,780,940,941,30,32,307,189,838,942,943],"class_list":{"0":"post-9150","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-threat-intelligence","9":"tag-threat-intel","10":"tag-osint","11":"tag-threat-hunting","12":"tag-dns","13":"tag-malware","14":"tag-phishing","15":"tag-cybersecurity","16":"tag-security-operations","17":"tag-threat-assessment","18":"tag-digital-investigation","19":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox<\/title>\n<meta name=\"description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-06T13:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:57:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/malicious-dns-in-the-news-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"Malicious DNS in the News\",\"datePublished\":\"2023-11-06T13:00:27+00:00\",\"dateModified\":\"2024-04-26T20:57:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/\"},\"wordCount\":961,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/malicious-dns-in-the-news-thumbnail.jpg\",\"keywords\":[\"Threat Intelligence\",\"Threat Intel\",\"OSINT\",\"Threat hunting\",\"DNS\",\"Malware\",\"Phishing\",\"Cybersecurity\",\"Security Operations\",\"Threat assessment\",\"Digital Investigation\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/\",\"name\":\"Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/malicious-dns-in-the-news-thumbnail.jpg\",\"datePublished\":\"2023-11-06T13:00:27+00:00\",\"dateModified\":\"2024-04-26T20:57:57+00:00\",\"description\":\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/malicious-dns-in-the-news-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/malicious-dns-in-the-news-thumbnail.jpg\",\"width\":612,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/malicious-dns-in-the-news\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malicious DNS in the News\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox","description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/","og_locale":"en_US","og_type":"article","og_title":"Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox","og_description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/","og_site_name":"Infoblox Blog","article_published_time":"2023-11-06T13:00:27+00:00","article_modified_time":"2024-04-26T20:57:57+00:00","og_image":[{"width":612,"height":405,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/malicious-dns-in-the-news-thumbnail.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_title":"Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox","twitter_description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"Malicious DNS in the News","datePublished":"2023-11-06T13:00:27+00:00","dateModified":"2024-04-26T20:57:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/"},"wordCount":961,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/malicious-dns-in-the-news-thumbnail.jpg","keywords":["Threat Intelligence","Threat Intel","OSINT","Threat hunting","DNS","Malware","Phishing","Cybersecurity","Security Operations","Threat assessment","Digital Investigation"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/","name":"Malicious DNS in the News - DNS Early Detection - Lumma C2 | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/malicious-dns-in-the-news-thumbnail.jpg","datePublished":"2023-11-06T13:00:27+00:00","dateModified":"2024-04-26T20:57:57+00:00","description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/malicious-dns-in-the-news-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/malicious-dns-in-the-news-thumbnail.jpg","width":612,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/malicious-dns-in-the-news\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Malicious DNS in the News"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9150"}],"version-history":[{"count":12,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9150\/revisions"}],"predecessor-version":[{"id":9963,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9150\/revisions\/9963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/9934"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}