{"id":9203,"date":"2023-11-30T14:32:05","date_gmt":"2023-11-30T22:32:05","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9203"},"modified":"2024-04-26T13:59:10","modified_gmt":"2024-04-26T20:59:10","slug":"dns-early-detection-romcom","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/","title":{"rendered":"DNS Early Detection &#8211; ROMCOM"},"content":{"rendered":"<p>Infoblox\u2019s DNS Early Detection Program utilizes proprietary techniques to identify potentially malicious domains at the earliest opportunity. The program shares our recent analysis of malicious domains disclosed through public OSINT, contrasting it with our preliminary identification of these domains as suspicious.<\/p>\n<p>Threat actors have refined their techniques, causing most of the potential damage before malicious domains are identified and shared through open source intelligence (OSINT) and the majority of commercial threat intel feeds. They are capitalizing on the speed of execution, which necessitates a swift response from defenders.<\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align:center;\"><strong>Infoblox finds potentially dangerous DNS domains faster. Infoblox identification of these suspicious domains makes them available for blocking weeks, even months, earlier than the domains published in many industry-wide malicious threat intel feeds.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Void Rabisu ROMCOM<\/h3>\n<p>Void Rabisu, an evolving and sophisticated threat actor group, also known as Storm-0978, Tropical Scorpius, and UNC2596 has been identified as using a new variation of their malware ROMCOM<sup>1<\/sup>. The ROMCOM backdoor was first discovered in 2022 and has undergone several iterations, with the latest variant known as the slimmed down version of ROMCOM also called ROMCOM 4.0, ROMCOMLITE, and PEAPOD.<\/p>\n<p>The ROMCOM malware tool is used to enable both espionage and financially motivated attacks<sup>2<\/sup>. Void Rabisu initially concentrated on ransomware attacks with financial motives. However, they have since shown an increasing interest in cyberespionage.<\/p>\n<p>In the most recent attacks Void Rabisu has primarily targeted organizations in Ukraine and various NATO countries including military personnel, government agencies and political leaders. They have recently been observed targeting female political leaders within these countries using the new ROMCOMLITE variant.<\/p>\n<p>The ROMCOM backdoor\u2019s capabilities extend beyond espionage, as it can steal sensitive information and deploy other malware. Void Rabisu\u2019s use of this malware tool highlights the group\u2019s adaptability and growing sophistication of their cyberattacks. Void Rabisu remains an active and dangerous threat actor, and organizations should be vigilant in protecting themselves against their attacks.<\/p>\n<h3>Understanding Void Rabisu and the ROMCOM Cyber Kill Chain<sup>3<\/sup><\/h3>\n<p>In approximately early August 2023 Void Rabisu set up a fake version of the official website of the Women Political Leaders (WPL) Summit held in Brussels earlier in June. This malicious website utilized social engineering techniques to entice victims into downloading malicious attachments containing the backdoor<sup>4<\/sup>.<\/p>\n<p>Specifically, the correct domain name for the official website is <strong>wplsummit.org<\/strong>. This domain was spoofed using a <strong><a href=\"https:\/\/insights.infoblox.com\/resources-whitepaper\/infoblox-report-deep3r-look-at-lookal1ke-attacks\" target=\"_blank\" rel=\"noopener\">lookalike domain<\/a><\/strong> and presented instead as the fake website:<\/p>\n<table class=\"domainbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td><strong>Malicious Domain #1:<\/strong> wplsummit[.]com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>When various photos were selected and clicked for download, this fake and malicious website ultimately delivered the ROMCOM payload. Once downloaded and active, the malware sends a request for to a URL \/favicon.ico in the malicious domain:<\/p>\n<table class=\"domainbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td><strong>Malicious Domain #2:<\/strong> https:\/\/mctelemetryzone[.]com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This, in turn, initiates the download of an encrypted file which works to set up the payload. After several activities another outreach to a malicious domain is made to download the 3rd stage component:<\/p>\n<table class=\"domainbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td><strong>Malicious Domain #3:<\/strong> redditanalytics[.]pm<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This <strong>redditanalytics[.]pm<\/strong> component, in turn, communicates with the C2 server:<\/p>\n<table class=\"domainbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td><strong>Malicious Domain #4:<\/strong> netstaticsinformation[.]com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>These various components continue to execute the Kill Chain which ultimately supports the threat actor\u2019s espionage and\/or financial objectives. Other ROMCOM identified or suspected C2 servers identified in OSINT<sup>5<\/sup> include but are not limited to:<\/p>\n<table class=\"domainbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td><strong>Malicious Domain #5:<\/strong> wirelessvezion[.]com<\/td>\n<\/tr>\n<tr>\n<td><strong>Malicious Domain #6:<\/strong> budgetnews[.]org<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Malicious domain #5 appears to be using <strong>typosquatting techniques<\/strong> to mimic perhaps a legitimate Verizon wireless domain or branding. Malicious domain #6 is using a \u201c.org\u201d top level domain which seems to carry trusted branding for many internet users. This trust is no longer deserved as anyone can buy these domains today and use them for malicious purposes.<\/p>\n<p>The attack likely started in early August, on or around the 8th when the lookalike domain #1 was set up. Some of the components like the C2 we can see had domain names set up even earlier.<\/p>\n<p>Infoblox threat intelligence identified domains #2, #3, and #4, #5, and #6 as suspicious an average of 91.6 days or over 3 months ahead of their identification and release as malicious in OSINT. Domains #2, #3, and #4 are key and essential components of the ROMCOM Kill Chain.<\/p>\n<p><b>The identification and subsequent blocking by the Infoblox ecosystem of any one (1) of these domains would have stopped the ROMCOM Kill Chain immediately.<\/b><\/p>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align:center;\"><strong>Infoblox identified multiple ROMCOM malicious domains as suspicious an average of 91.6 days or over 3 months ahead of their identification and release as malicious in OSINT. This enabled our customers to block them and prevent execution of the ROMCOM Kill Chain.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>There have been many malicious domains attributed to VOID RABISU and ROMCOM over time. The domains highlighted in this blog include most of those identified in recent OSINT analysis published approximately on October 13, 2023.<\/p>\n<h3>Supporting Analysis and Methodology<\/h3>\n<p>On October 13, 2023, data on newly identified ROMCOM domains was published in OSINT. Analysis of these malicious domains was done by the Infoblox team to determine if they were identified earlier by our suspicious domain feeds.<\/p>\n<p>Each malicious ROMCOM domain identified in OSINT was researched in the Infoblox Dossier portal by our team. We reviewed our timeline feature to extract the earliest dates associated with Infoblox suspicious designation. We also extracted the WHOIS information for additional context.<\/p>\n<p>The conclusions of our analysis were definitive. <strong>Key ROMCOM domains which are critical path components of the ROMCOM Kill Chain<\/strong> were identified as suspicious by Infoblox threat intelligence an average of <strong>91.6 days<\/strong> prior to the availability of the OSINT designation as malicious.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/dns-early-detection-romcom-img-1.png\" \/><\/p>\n<p>It is often the case that OSINT publication dates may sometimes be unclear or lack precision. The dates of published articles by reputable 3rd parties may not always accurately reflect the OSINT availability of each individual domain as identified by their threat researchers.<\/p>\n<p>To provide context on the performance of our suspicious threat intel feeds we extracted WHOIS dates and found that <strong>the same ROMCOM domains were blocked as suspicious within an average of 1.6 days after the WHOIS domain registration date<\/strong>. The WHOIS dates are almost always precise and provide another perspective on the high value of suspicious threat intel feed content.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/dns-early-detection-romcom-img-2.png\" \/><\/p>\n<h3>Risk Reduction and Return on Investment<\/h3>\n<table class=\"calloutbox\" style=\"word-break: keep-all;\">\n<tbody>\n<tr>\n<td style=\"text-align:center;\"><strong>Infoblox\u2019s suspicious domain data can help our customers avoid a potentially devastating data breach. Suspicious domain data can reduce risk and increase the return on investment for your threat intelligence program.<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The use of our proprietary technology to identify suspicious domains is a major \u201cShift Left\u201d to normal processes used across the industry to develop and leverage threat intelligence information. Infoblox suspicious domain data helps security operations teams gain the timely information they need to better address and defeat the barrage of new threats before they can cause harm.<\/p>\n<h3>For Additional Information<\/h3>\n<p>The Infoblox Threat Intelligence Group provides fast access to accurate, contextual threat alerts and reports sourced from our own real-time research teams. Suspicious Domains feeds were introduced as an Infoblox proprietary product on November 10, 2022 and, since then, have successfully provided many thousands of customers with the advanced information to block domains which ultimately become malicious long before most other threat intelligence sources identify them as malicious. Infoblox allows your team to leverage the high value of suspicious domain threat intelligence while ensuring unified security policy across your entire security infrastructure. Infoblox threat data minimizes false positives, so you can be confident in what you are blocking.<\/p>\n<p>To learn more about suspicious domains and DNS early detection:<br \/>\n<strong><a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.infoblox.com\/threat-intel\/<\/a><\/strong><\/p>\n<p>To learn more about lookalike domains:<br \/>\n<strong><a href=\"\/cyber-threat-intelligence\/lookalike-domain-attacks-are-on-the-rise-be-on-the-lookout-for-these-four-types\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/lookalike-domain-attacks-are-on-the-rise-be-on-the-lookout-for-these-four-types\/<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/insights.infoblox.com\/resources-whitepaper\/infoblox-report-deep3r-look-at-lookal1ke-attacks\" target=\"_blank\" rel=\"noopener\">https:\/\/insights.infoblox.com\/resources-whitepaper\/infoblox-report-deep3r-look-at-lookal1ke-attacks<\/a><\/strong><\/p>\n<p>To learn more about BloxOne Threat Defense:<br \/>\n<strong><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/a><\/strong><\/p>\n<p>To learn more about Advanced DNS Protection:<br \/>\n<strong><a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/<\/a><\/strong><\/p>\n<p>To learn more about the National Security Agency (NSA) and Cybersecurity &amp; Infrastructure Security Agency (CISA) guidance on Protective DNS:<br \/>\n<strong><a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF\" target=\"_blank\" rel=\"noopener\">https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF<\/a><\/strong><\/p>\n<p>To learn how using NSA analysis concluded that, \u201cDNS would reduce the ability for 92 percent of malware attacks both from command and control perspective, deploying malware on a given network.\u201d based on NSA analysis.\u201d<br \/>\n<strong><a href=\"https:\/\/executivegov.com\/2020\/06\/anne-neuberger-on-nsas-secure-dns-pilot-program\/\" target=\"_blank\" rel=\"noopener\">https:\/\/executivegov.com\/2020\/06\/anne-neuberger-on-nsas-secure-dns-pilot-program\/<\/a><\/strong><\/p>\n<h3 style=\"font-size:18px;\">Footnotes<\/h3>\n<ol style=\"font-size:14px;\">\n<li><a href=\"https:\/\/thehackernews.com\/2023\/10\/new-peapod-cyberattack-campaign.html\"><b>https:\/\/thehackernews.com\/2023\/10\/new-peapod-cyberattack-campaign.html<\/b><\/a><\/li>\n<li>Void Ramisu: \u201cA Sophisticated Threat Actor Group Using the ROMCOM Backdoor for Espionage and Financially Motivated Attacks\u201d Mandiant Security Response 2022. <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/e\/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html\"><b>https:\/\/www.trendmicro.com\/en_us\/research\/23\/e\/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html<\/b><\/a><\/li>\n<li>Cyber Kill Chain is a registered trademark of Lockheed Martin <a href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\"><b>https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html<\/b><\/a><\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/j\/void-rabisu-targets-female-leaders-with-new-romcom-variant.html\"><b>https:\/\/www.trendmicro.com\/en_us\/research\/23\/j\/void-rabisu-targets-female-leaders-with-new-romcom-variant.html<\/b><\/a><\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/23\/j\/void-rabisu-targets-female-political-leaders\/ioc-void-rabisu-targets-female-political-leaders-with-new-slimmed-down-ROMCOM-variant.txt\"><b>https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/23\/j\/void-rabisu-targets-female-political-leaders\/ioc-void-rabisu-targets-female-political-leaders-with-new-slimmed-down-ROMCOM-variant.txt<\/b><\/a><\/li>\n<\/ol>\n<style>\n.calloutbox, .domainbox {\nmargin-bottom:20px;\n}\n.domainbox td {\npadding:10px !important;\n}\n<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Infoblox\u2019s DNS Early Detection Program utilizes proprietary techniques to identify potentially malicious domains at the earliest opportunity. The program shares our recent analysis of malicious domains disclosed through public OSINT, contrasting it with our preliminary identification of these domains as suspicious. Threat actors have refined their techniques, causing most of the potential damage before malicious [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":9954,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[952,953,954,40,780,940,941,30,32,307,189,942,943,838],"class_list":{"0":"post-9203","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-void-rabisu","9":"tag-romcom-malware","10":"tag-peapod-malware","11":"tag-threat-intelligence","12":"tag-threat-intel","13":"tag-osint","14":"tag-threat-hunting","15":"tag-dns","16":"tag-malware","17":"tag-phishing","18":"tag-cybersecurity","19":"tag-threat-assessment","20":"tag-digital-investigation","21":"tag-security-operations","22":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox<\/title>\n<meta name=\"description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-30T22:32:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:59:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-early-detection-romcom-thumbnail-v2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"DNS Early Detection &#8211; ROMCOM\",\"datePublished\":\"2023-11-30T22:32:05+00:00\",\"dateModified\":\"2024-04-26T20:59:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/\"},\"wordCount\":1414,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-early-detection-romcom-thumbnail-v2.jpg\",\"keywords\":[\"Void Rabisu\",\"ROMCOM malware\",\"PEAPOD malware\",\"Threat Intelligence\",\"Threat Intel\",\"OSINT\",\"Threat hunting\",\"DNS\",\"Malware\",\"Phishing\",\"Cybersecurity\",\"Threat assessment\",\"Digital Investigation\",\"Security Operations\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/\",\"name\":\"DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-early-detection-romcom-thumbnail-v2.jpg\",\"datePublished\":\"2023-11-30T22:32:05+00:00\",\"dateModified\":\"2024-04-26T20:59:10+00:00\",\"description\":\"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-early-detection-romcom-thumbnail-v2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-early-detection-romcom-thumbnail-v2.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-early-detection-romcom\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Early Detection &#8211; ROMCOM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox","description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/","og_locale":"en_US","og_type":"article","og_title":"DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox","og_description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/","og_site_name":"Infoblox Blog","article_published_time":"2023-11-30T22:32:05+00:00","article_modified_time":"2024-04-26T20:59:10+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-early-detection-romcom-thumbnail-v2.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_title":"DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox","twitter_description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"DNS Early Detection &#8211; ROMCOM","datePublished":"2023-11-30T22:32:05+00:00","dateModified":"2024-04-26T20:59:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/"},"wordCount":1414,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-early-detection-romcom-thumbnail-v2.jpg","keywords":["Void Rabisu","ROMCOM malware","PEAPOD malware","Threat Intelligence","Threat Intel","OSINT","Threat hunting","DNS","Malware","Phishing","Cybersecurity","Threat assessment","Digital Investigation","Security Operations"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/","name":"DNS Early Detection - ROMCOM - Malicious DNS in the News | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-early-detection-romcom-thumbnail-v2.jpg","datePublished":"2023-11-30T22:32:05+00:00","dateModified":"2024-04-26T20:59:10+00:00","description":"Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS based threats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-early-detection-romcom-thumbnail-v2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-early-detection-romcom-thumbnail-v2.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-early-detection-romcom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"DNS Early Detection &#8211; ROMCOM"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9203"}],"version-history":[{"count":10,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9203\/revisions"}],"predecessor-version":[{"id":9964,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9203\/revisions\/9964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/9954"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}