{"id":9545,"date":"2024-02-20T06:00:52","date_gmt":"2024-02-20T14:00:52","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9545"},"modified":"2024-04-26T13:56:00","modified_gmt":"2024-04-26T20:56:00","slug":"ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/","title":{"rendered":"Ivanti Connect Secure VPN Exploitation &#8211; Correctly Interpreting DNS IoCs"},"content":{"rendered":"<h3 style=\"margin-bottom:20px;\">Author: Brent Eskridge<\/h3>\n<p>On January 10, 2024 Ivanti <a href=\"https:\/\/forums.ivanti.com\/s\/article\/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US\">announced<\/a> that their Connect Secure VPN devices, formerly known as Pulse Connect Secure and Ivanti Policy Secure gateways, were compromised by attackers exploiting two zero-days. Given the wide usage of Ivanti devices, the response to the attacks has been understandably swift. Organizations are frantically patching their devices and searching for any indications that they may have been a victim. Some of the earliest reporting, such as the reports from Mandiant (<a href=\"https:\/\/www.mandiant.com\/resources\/blog\/suspected-apt-targets-ivanti-zero-day\">1<\/a>, <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/investigating-ivanti-zero-day-exploitation\">2<\/a>) and <a href=\"https:\/\/www.cybereason.com\/blog\/threat-alert-ivanti-connect-secure-vpn-zero-day-exploitation\">Cybereason<\/a>, provided important details on the attacks and included multiple Indicators of Compromise (IoCs). These IoCs can be invaluable for defenders as they begin to hunt through their networks, but only if used properly.<\/p>\n<p>After reading reports like these, Infoblox customers often ask us if we are blocking the domains listed as IoCs. While it is a legitimate and important question to ask, the reality is it is more complex than simply adding domains from a list of IoCs to a blocklist. Blocking domains using DNS is a powerful tool in defending networks and managing risk, but can easily create more problems than it solves if not done thoughtfully. This situation is a perfect illustration of the challenges we face in attacks such as these. Incident responders face the challenge of providing accurate and timely information in a rapidly developing situation and defenders face the challenge of effectively using that information to protect their networks. Using the IoCs from the Ivanti attacks as examples, we will show some of the factors that defenders need to consider when evaluating whether or not domains should be blocked.<\/p>\n<table class=\"calloutbox\">\n<tbody>\n<tr>\n<td>Domains discovered during incident response are meant for incident response, not blocking.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Not All Domains Should be Treated Equally<\/h3>\n<p>Domains discovered during incident response are meant for incident response, not blocking.\u00a0 More research is needed before any action can be considered. Given the fast paced environment of incident response, there often isn\u2019t much time for an in-depth analysis of 3rd-party domains, which can result in false positives being included in initial reports. Even if all the domains listed are actual indicators of compromise (IoCs), that doesn\u2019t mean the domains can or should be blocked. Often these domains are technically indicators of activity (IoA) rather than compromise.<\/p>\n<p>Without evidence, each domain listed as an IoC should be critically analyzed. Defenders understand that even though <span class=\"code-format\">www.google[.]com<\/span> might be discovered as relevant in an incident response, blocking it could cause more problems than it solves. In the articles describing the Ivanti attacks, Infoblox Threat Intel has found three categories of domains that should not be blocked, despite their presence on the IoC list.<\/p>\n<ul>\n<li>The IoC domain appears to be legitimate and without more evidence, blocking it could negatively impact our customers. For example, the site or some of its content (e.g., a JavaScript library) could have been compromised and since remediated. Blocking the domain wouldn\u2019t provide any protection and would simply inconvenience customers.<\/li>\n<li>The IoC domain is actually a sub-domain of a dynamic DNS provider. Blocking the domain of the provider would block the suspicious subdomain, but it would also block every other subdomain used by the provider. This is one of the reasons that dynamic DNS is appealing to threat actors. It is easy to hide inside dynamic DNS and the business case for blocking it is challenging to make.<\/li>\n<li>The IoC domain isn\u2019t a valid domain. There are two \u201cdomains\u201d listed as an IoC in various reports that aren\u2019t registered domains. Adding these to a blocklist wouldn\u2019t provide any benefit and would only serve to add noise. Infoblox systems do not allow the addition of this type of indicator.<\/li>\n<\/ul>\n<p>The table below shows the results of our analysis on the domains listed as IoCs. The majority have either not been observed in customer DNS or had minimal DNS resolutions, meaning adding them to a blocklist would have little to no customer impact. However, there are two domains that had we blindly blocked after reading news reports, could have negatively impacted customers, without much benefit.<\/p>\n<table class=\"ioc-results\">\n<tbody>\n<tr>\n<th><b>IoC<\/b><\/th>\n<th><b>Valid<\/b><\/th>\n<th><b>Customer Impact<\/b><\/th>\n<th><b>Create Date<\/b><\/th>\n<th><b>Notes<\/b><\/th>\n<\/tr>\n<tr>\n<td>api.d-n-s[.]name<\/td>\n<td>\u2713<\/td>\n<td>Moderate<\/td>\n<td>2004-09-04<\/td>\n<td>Dynamic DNS provider<br \/>\nOther subdomains observed in customer DNS, but not this subdomain<\/td>\n<\/tr>\n<tr>\n<td>ehangmun[.]com<\/td>\n<td>\u2713<\/td>\n<td>None<\/td>\n<td>2007-11-01<\/td>\n<td>Appears to be a legitimate site<\/td>\n<\/tr>\n<tr>\n<td>entraide-internationale[.]fr<\/td>\n<td>\u2713<\/td>\n<td>Low<\/td>\n<td>2010-08-27<\/td>\n<td>Appears to be a legitimate site<\/td>\n<\/tr>\n<tr>\n<td>miltonhouse[.]nl<\/td>\n<td>\u2713<\/td>\n<td>Moderate<\/td>\n<td>2010-12-21<\/td>\n<td>Well-established and legitimate site<\/td>\n<\/tr>\n<tr>\n<td>cpanel.netbar[.]org<\/td>\n<td>\u2713<\/td>\n<td>Low<\/td>\n<td>2019-12-18<\/td>\n<td>Other subdomains observed in customer DNS, but not this subdomain<\/td>\n<\/tr>\n<tr>\n<td>areekaweb[.]com<\/td>\n<td>\u2713<\/td>\n<td>Low<\/td>\n<td>2021-03-12<\/td>\n<td>Appears to be a legitimate site<\/td>\n<\/tr>\n<tr>\n<td>symantke[.]com<\/td>\n<td>\u2713<\/td>\n<td>Low<\/td>\n<td>2022-08-21<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>secure-cama[.]com<\/td>\n<td>\u2713<\/td>\n<td>None<\/td>\n<td>2023-05-30<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>line-api[.]com<\/td>\n<td>\u2713<\/td>\n<td>Low<\/td>\n<td>2023-08-30<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>clickcom[.]click<\/td>\n<td>\u2713<\/td>\n<td>None<\/td>\n<td>2024-01-21<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>clicko[.]click<\/td>\n<td>\u2713<\/td>\n<td>Low<\/td>\n<td>2024-01-21<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>duorhytm[.]fun<\/td>\n<td>\u2713<\/td>\n<td>None<\/td>\n<td>2024-01-21<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>logclear[.]pl<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>Not a valid \/ registered domain<\/td>\n<\/tr>\n<tr>\n<td>request[.]data<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td>Not a valid \/ registered domain<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Infoblox Understands DNS<\/h3>\n<p>Each of these issues highlight the fact that effective DNS security is much more than simply adding domains to a blocklist. A deep understanding of DNS is needed when using threat intelligence for blocking. Blocklists are a powerful tool in defending networks, but it can wreak more havoc than it prevents if done incorrectly. Infoblox Threat Intel constantly attempts to balance the need to protect customer networks from potentially harmful content and the reality that one wrong blocked domain can shut down those same customer networks.<\/p>\n<h3>For Additional Information<\/h3>\n<p>Infoblox Threat Intel provides fast access to accurate, contextual threat alerts and reports sourced from our own real-time research teams. Suspicious Domains feeds were introduced as an Infoblox proprietary product on November 10, 2022 and, since then, have successfully provided many thousands of customers with the advanced information to block domains which ultimately become malicious long before most other threat intelligence sources identify them as malicious. Infoblox allows your team to leverage the high value of suspicious domain threat intelligence while ensuring unified security policy across your entire security infrastructure. Infoblox threat data minimizes false positives, so you can be confident in what you are blocking.<\/p>\n<p>To learn more about suspicious domains and DNS early detection: <a href=\"https:\/\/www.infoblox.com\/threat-intel\/\">https:\/\/www.infoblox.com\/threat-intel\/<\/a><\/p>\n<p>To learn more about BloxOne Threat Defense:<br \/>\n<a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/a><\/p>\n<p>To learn more about the National Security Agency (NSA) and Cybersecurity &amp; Infrastructure Security Agency (CISA) guidance on Protective DNS:<br \/>\n<a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF\">https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_PROTECTIVE%20DNS_UOO117652-21.PDF<\/a><\/p>\n<style>\n.calloutbox {\n    margin-bottom: 20px;\nword-break: keep-all;\n}\n.calloutbox td {\n    padding: 20px;\n    text-align:center;\n}\n.ioc-results {\nfont-size:14px;\nword-break: keep-all;\n}\n.code-format {\nfont-family: \u201cCourier New\u201d\n}\n@media only screen and (max-width: 650px) {\n.ioc-results {\nfont-size:12px;\n}\n.ioc-results td:last-child, .ioc-results th:last-child {\npadding-right:10px;\n}\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Ivanti Connect Secure VPN Exploitation<\/span> - Correctly Interpreting DNS IoCs');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Brent Eskridge On January 10, 2024 Ivanti announced that their Connect Secure VPN devices, formerly known as Pulse Connect Secure and Ivanti Policy Secure gateways, were compromised by attackers exploiting two zero-days. Given the wide usage of Ivanti devices, the response to the attacks has been understandably swift. Organizations are frantically patching their devices [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":9944,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[333,189,943,30,993,32,940,307,955,942,941,780,40,994],"class_list":{"0":"post-9545","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-cyberattack","9":"tag-cybersecurity","10":"tag-digital-investigation","11":"tag-dns","12":"tag-ivanti","13":"tag-malware","14":"tag-osint","15":"tag-phishing","16":"tag-securityoperations","17":"tag-threat-assessment","18":"tag-threat-hunting","19":"tag-threat-intel","20":"tag-threat-intelligence","21":"tag-zero-day","22":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox<\/title>\n<meta name=\"description\" content=\"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-20T14:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:56:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Ivanti Connect Secure VPN Exploitation &#8211; Correctly Interpreting DNS IoCs\",\"datePublished\":\"2024-02-20T14:00:52+00:00\",\"dateModified\":\"2024-04-26T20:56:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/\"},\"wordCount\":1069,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg\",\"keywords\":[\"Cyberattack\",\"Cybersecurity\",\"Digital Investigation\",\"DNS\",\"IVANTI\",\"Malware\",\"OSINT\",\"Phishing\",\"Securityoperations\",\"Threat assessment\",\"Threat hunting\",\"Threat Intel\",\"Threat Intelligence\",\"Zero-day\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/\",\"name\":\"Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg\",\"datePublished\":\"2024-02-20T14:00:52+00:00\",\"dateModified\":\"2024-04-26T20:56:00+00:00\",\"description\":\"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg\",\"width\":612,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ivanti Connect Secure VPN Exploitation &#8211; Correctly Interpreting DNS IoCs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox","description":"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/","og_locale":"en_US","og_type":"article","og_title":"Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox","og_description":"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/","og_site_name":"Infoblox Blog","article_published_time":"2024-02-20T14:00:52+00:00","article_modified_time":"2024-04-26T20:56:00+00:00","og_image":[{"width":612,"height":405,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox","twitter_description":"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Ivanti Connect Secure VPN Exploitation &#8211; Correctly Interpreting DNS IoCs","datePublished":"2024-02-20T14:00:52+00:00","dateModified":"2024-04-26T20:56:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/"},"wordCount":1069,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg","keywords":["Cyberattack","Cybersecurity","Digital Investigation","DNS","IVANTI","Malware","OSINT","Phishing","Securityoperations","Threat assessment","Threat hunting","Threat Intel","Threat Intelligence","Zero-day"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/","name":"Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg","datePublished":"2024-02-20T14:00:52+00:00","dateModified":"2024-04-26T20:56:00+00:00","description":"Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can\u2019t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any potential benefits. Learn some of the reasons why a deep understanding of DNS is needed when using threat intelligence from incident response.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs-thumbnail.jpg","width":612,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/ivanti-connect-secure-vpn-exploitation-correctly-interpreting-dns-iocs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Ivanti Connect Secure VPN Exploitation &#8211; Correctly Interpreting DNS IoCs"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9545"}],"version-history":[{"count":11,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9545\/revisions"}],"predecessor-version":[{"id":9960,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9545\/revisions\/9960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/9944"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}