Nusuk Hajj platform offers 6 packages for foreign pilgrims    Expatriates' passport information can be updated through Absher for a fee of SR69    Hotel and Hospitality Expo expects 6,000 buyers at Saudi Arabia's largest industry gathering    Trump suspends global tariffs for 90 days, hikes China import tax to 125%    Virtual Branch enables HR Ministry to bring down in-person visits by 93%    Saudi Arabia announces 14 oil and gas discoveries in Eastern Province and Empty Quarter    Issuance of commercial registrations surge 48% by 154,000 in 1Q of 2025    Tourism Ministry announces 89% growth in licensed hospitality facilities in 2024    Dozens reportedly injured by Russian drone attacks across Ukraine    Sabiri strike gives Al Taawoun narrow first-leg win over Sharjah in ACL Two semi-final    Douglas Gauthier appointed CEO of the Royal Arts Complex in Riyadh's King Salman Park    King Abdulaziz Library unveils 400 rare Qur'an manuscripts    Faulty antenna played role in fatal Australian helicopter crash    Iran says it is ready for nuclear deal if US stops military threats    Nightclub collapse kills 79 in Dominican Republic's capital    Saudi Arabia ranked first globally in empowering women in AI    Woman becomes first in UK to give birth after womb transplant    Women make up 20% of e-sports players in Saudi Arabia    Pakistani star's Bollywood return excites fans and riles far right    Saudi U-17s qualify for 2025 FIFA World Cup after win over Thailand    Benzema rescues Al Ittihad with stoppage-time equalizer in thrilling Jeddah Derby    Veteran Bollywood actor Manoj Kumar dies at 87    Bollywood actress vindicated over boyfriend's death after media hounding    Grand Mufti rules against posting prayers and preaching in mosques on social media    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Secure DNS infrastructure against malicious domains
Published in The Saudi Gazette on 06 - 03 - 2017


By Ashraf Sheet, Regional Director MEA at Infoblox
DUBAI — The constant creation of malicious domains has proved a cat and mouse game for threat researchers and cybercriminals. Across the world, new malicious domains are constantly being created from which cybercriminals can launch attacks against businesses' Domain Name System (DNS) infrastructure.
During what is known as the ‘planting' phase, the Infoblox DNS Threat Index, which monitors the creation of such domains, shows a significant increase in the number of malicious domains associated with malware and exploit kits.
In the second ‘harvesting' phase, the attackers begin to reap the bounty from these newly created malicious domains, launching attacks on organizations' DNS to exfiltrate data or just to wreak havoc on their victims.
A great amount of this malicious infrastructure is being used in the creation of exploit kits. This particularly disturbing category of malware is part of a growing trend of off-the-shelf, user-friendly cybercrime tools.
These tool-kits-for-hire deliver malware via drive-by download, ultimately providing cybercriminals with an opportunity to wreak great havoc on an organization with little or no technical knowledge. Indeed, attackers using exploit kits don't need to understand how they create or deliver the exploit needed to infect a server, and the attack itself is often facilitated by a user-friendly interface featured in the kits itself to help hackers manage and monitor their malware campaign. All of this ultimately serves to lower the technical bar for sowing malware.
It is therefore unsurprising that exploit kits have cemented their place as a popular motive for malicious domain creation.
Angler continues to reign as the most popular exploit kit. Indeed, just recently Perez Hilton, the celebrity gossip website, was hacked, redirecting its visitors to the Angler landing page which in turn exposed users to CryptXXX ransomware.
These tool kits generally exploit vulnerabilities or security flaws in operating systems, browsers, and popular software such as Adobe Flash and Java. Then, just as in the Perez Hilton case, users are exposed to the kits (and their payloads) via malvertizing and spam on the compromised websites.
When an exploit is successful in delivering its payload onto a victim's device, it is then able to operate behind the service provider's or company's firewall. This malware can then spread across the internal network to other devices, as well as communicating back to its command-and-control (C&C) server, which enables it to download more malicious software or exfiltrate data. Often the organization's own DNS is used to facilitate communication between the infected device and its C&C server.
Like all command and control malware, phishing and many other threats, exploit kits use DNS to achieve their ultimate aim, whether that is data exfiltration or mass malware infection. For that reason, it has never been more important for organizations to protect their DNS infrastructure.
While DNS infrastructure is inherently a vulnerable component for organizations, effective internal DNS security solutions can turn it into a great asset for securing an organization's networks and data. And this is possible without having to change the existing network architecture.
Using DNS response policy zones (RPZs) on internal DNS, combined with an up-to-date threat intelligence feed of malicious destinations, enables DNS appliance to intercept those DNS queries which are associated with known malware. This effectively prevents the threat from communicating with its external C&C servers to wreak further havoc: preventing both data exfiltration using standard network protocols and malware from breeding in the network.
Furthermore, internal DNS security can identify and prevent data exfiltration using DNS tunneling techniques by establishing query thresholds. This benchmark then enables the DNS to detect and flag any unusually large queries or responses which may contain packets of data.
With the wealth of intelligence that can be garnered both on the types of threats facing DNS infrastructure and on the malicious domains being created to exploit it, organizations in Saudi can take effective steps to prevent attack vectors from exploiting this infrastructure. And as the technical bar is lowered for attacks, as with exploit kits, whose popularity will only rise, DNS security will only become ever more crucial.
Inherently vulnerable, yet with great potential: no organization should overlook this vital component of network architecture and leave it unprotected. DNS is capable of being an important defense against exploit kits and other attack vectors which rely on it to achieve their criminal aims.


Clic here to read the story from its source.