Skip to content
Return to Infoblox Homepage

Infoblox Threat Intel

DNS All Day, Every Day

DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access give us a high-powered scope to zero in on cyber threats.

What We Do

0%
of threats detected before the first DNS query
0days
of protection on average before an attack
0%
false positive rate
0Million
new indicators added per month
0Billion
DNS events analyzed daily

Infoblox is finding the threat actors hiding in your DNS

We are the leading creator of original DNS threat intelligence. We’re proactive, not just defensive, using our insights to track threat actor infrastructure and disrupt cybercrime where threat actors begin. We also believe in sharing knowledge to support the broader security community by publishing detailed research on select actors and associated indicators.

Threat actors discovered by Infoblox

Vextrio

Viper

Published: June 6, 2022

The longest running traffic distribution system (TDS) known in the industry with the largest number of criminal affiliates, brokering traffic for others while delivering malicious campaigns of their own.

Why is this special? First identification of a large-scale TDS discovered through DNS and the use of a dictionary domain generation algorithm (DDGA).

Decoy
Dog

Published: July 25, 2023

A nation state DNS C2 malware toolkit. Confirmed to be an advanced variant of Pupy RAT, Russian security vendors later claimed Decoy Dog was used to disrupt Russian critical infrastructure.

Why is this special? First discovery and characterization of a C2 malware solely from DNS.

Loopy
Lizard

Published: October 16, 2023

A phishing actor that steals credentials from consumers in Europe, the United States, and Australia using lookalike domains to financial institutions and government tax agencies. Formerly known as Open Tangle.

Why is this special? This is the first reporting of a dedicated lookalike domain actor.

Prolific
Puma

Published: October 31, 2023

A malicious link shortening service used by criminals to target consumers worldwide. This actor successfully overcame privacy controls for the usTLD before being exposed by Infoblox.

Why is this special? First description of a malicious link shortener in the industry.

Savvy

Seahorse

Published: February 28, 2024

A persistent investment fraud actor who leverages DNS CNAME records as a traffic distribution system (TDS) to control access to their malicious content spread through Facebook ads.

Why is this special? First description of the use of DNS CNAME records by threat actors to control and direct content for users.

Muddling
Meerkat

Published: April 29, 2024

A cunning actor abusing open resolvers worldwide with MX records and triggering China’s Great Firewall to act mysteriously.

Why is this special? First documentation of modified DNS MX records by the Great Firewall.

Revolver
Rabbit

Published: July 17, 2024

A DNS actor using an advanced algorithm to create hundreds of thousands of domains for use in advertising campaigns.

Why is this special? Revolver Rabbit’s RDGA is prolific, varied, and exemplifies the challenge in discovering and determining the nature of networks designed to obscure actor operations.

Vigorish
Viper

Published: July 22, 2024

A Chinese organized crime syndicate that designed and operates a technology suite that is a full cybercrime supply chain: composed of software, Domain Name System (DNS) configurations, website hosting, payment mechanisms, mobile apps, and more.

Why is this special? This research connects numerous stories by journalists and human rights activists to a single organized crime network.

Horrid
Hawk

Published: November 14, 2024

A financially motivated threat actor has been hijacking thousands of domains since at least February 2023 for investment fraud schemes. These hijacked domains are embedded in short-lived Facebook ads targeting users in more than 30 languages across multiple continents.

Why is this special? The hijacked domains are taken over using the ‘Sitting Ducks’ attack vector and are utilized in every step of the actors’ campaigns.

How Infoblox creates original DNS threat intelligence

DNS Experts

We discover threat actors hiding in DNS because we know where to look. Starting with suspicious domains, we connect the dots and identify actor infrastructure, then begin tracking it as it evolves. Identifying new domains as they emerge so customers are continually protected.

Threat Expertise

We know how malicious actors operate and how malware, phishing, and other threats manifest in DNS. We’ve used this knowledge to develop specialized systems to detect lookalike domains, DNS C2 malware, registered domain generation algorithms (RDGAs) and suspicious behavior.

Data Science

We use machine learning and data science to analyze very large volumes of DNS queries every day to provide near-real time protection against data exfiltration, domain generation algorithms (DGAs), and a wide range of other threats.

Our threat intelligence powers
our security products

Disrupt cybercrime pre-incident with intel designed for DNS

BloxOne Threat Defense uses Infoblox Threat Intel to identify and stop threats before the rest of the industry.

LEARN HOW INFOBLOX CAN HELP

About our Team
Eat. Sleep. DNS. Repeat.

What sets us apart? Two things: mad DNS skills and unparalleled visibility.

Featured articles

Krebs on Security  |  October 31, 2023

.US Harbors Prolific Malicious Link Shortening Service

Infoblox tracks a three-year-old link shortening service that caters to phishers and malware purveyors

TechRepublic  |  February 9, 2024

IT Pros Missing Mega-Threat From Organised Cyber Criminals

VexTrio threat actor delivers high volumes of malware to networks globally

Bleeping Computer  |  February 28, 2024

Savvy Seahorse Gang Uses DNS CNAME Records to Power Investor Scams

Savvy seahorse directs Facebook users to fake investment platforms to steal personal data

Threat intelligence resources

Our team of DNS threat intelligence experts believe in sharing knowledge to support the broader security community. Please explore our resources and articles below.

Blog

Infoblox Threat Intel
March 27, 2025

A Phishing Tale of DoH and DNS MX Abuse

Large-scale phishing attacks use DoH and DNS MX records to dynamically serve fake login pages.

Read more
Blog

Jason Hill
March 13, 2025

Work Hard, Pay Harder!

Cybercriminals targeting individuals globally via messaging services with industrial-scale recruitment scam infrastructure.

Read more
Blog

Cricket Liu
March 10, 2025

How scammers hijack major brands

Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.

Read more
Blog

Renée Burton
March 6, 2025

Survey Says...It’s a Scam!

Bad actors use malicious adtech to deliver survey, sweepstakes and fake gift card scams to generate ad revenue and trick victims into time-consuming interactions that lead to theft of personal data and credit card fraud.

Read more
Blog

Bart Lenaerts-Bergmans
February 26, 2025

DNS Early Detection - Fast Propagating Fake Captcha distributes LummaStealer

Lumma Stealer, also known as LummaC2, is a type of malware that first appeared in 2022. It is designed to steal sensitive information from infected systems.

Read more
Blog

Infoblox Threat Intel
February 25, 2025

The Hidden Dangers of Malicious Adtech

Learn why malicious adtech is a risk for organizations of all sizes.

Read more
Blog

Renée Burton
January 27, 2025

Pushed Down the Rabbit Hole

The adverse impact of visiting compromised domains that integrate malicious adtech.

Read more
Blog

David Brunsdon
January 14, 2025

One Mikro Typo: How a simple DNS misconfiguration enables malware delivery by a Russian botnet

Russian threat actors combine domain name vulnerabilities with hidden router proxy techniques to scale their attacks while remaining shielded from detection.

Read more
Blog

Infoblox Threat Intel
January 8, 2025

Lessons from a Malspam Hunt

Explore how Infoblox Threat Intel analyzed spam campaigns originating behind the Great Chinese Firewall. Learn more about the usage of domain spoofing and the specific tactics used against victims.

Read more
Research Report

Stelios Chatzistogias, Laura da Rocha and Renée Burton
January 8, 2025

Muddling Malspam: The Use of Spoofed Domains in Malicious Spam

This paper is the result of a spam hunt. Despite established safeguards, Infoblox Threat Intel discovered widespread usage of malicious spam and domain spoofing emanating from Chinese IP space. Learn more about the discovered spam campaigns and the tactics used.

Read more
Blog

Infoblox Threat Intel
November 14, 2024

DNS Predators Hijack Domains to Supply their Attack Infrastructure

Learn how DNS threat actors hijack domains and use them in their malicious campaigns.

Read more
Research Report

Infoblox Threat Intel
November 14, 2024

DNS Predators Attack: Vipers and Hawks Hijack Sitting Ducks Domains

It all began with a lookalike domain. The domain was crafted to look like a Slack hosting resource, but it was hosted in Russia. Simple phishing?

Read more
Blog

Dave Mitchell and Adam Casella
October 15, 2024

Beware of Domain Collisions: Are Your Internal Domains Registered Externally?

Learn why understanding this risk is crucial for safeguarding your organization’s digital identity and preventing unauthorized access.

Read more
Blog

Infoblox Threat Intel
September 18, 2024

No, Elon Musk was not in the U.S. Presidential Debate

Cybercriminals used presidential debate-themed deep fake YouTube videos to advertise cryptocurrency scams.

Read more
Blog

Infoblox Threat Intel
July 31, 2024

Who Knew? Domain Hijacking Is So Easy

Learn about the insidious DNS attack vector that threat actors are using to hijack domains from major brands, government institutions…

Read more
Blog

Kat Persighetti
July 29, 2024

Olympics Scammers Take Their Marks, Get Set, and Go!

Every iteration of the Olympic games is a major global event – fueling pride and competition, watched by millions in homes around the world,…

Read more
Press Release

Infoblox Threat Intel
July 22, 2024

Infoblox Exposes: Chinese Cybercrime Syndicate Linking European Football Sponsors, Human Trafficking and a Trillion-Dollar Illegal Gambling Economy

Santa Clara, Calif., July 22, 2024 — Infoblox Inc., a leader in cloud networking and security services, today announced a significant breakthrough in cybercrime…

Read more
Blog

Maël Le Touz, Jacques Portal, Renée Burton,
and Elena Puga
July 22, 2024

Gambling is No Game: DNS Links Between Chinese Organized Crime and Sports Sponsorships

Learn how the detection of a single anomalous domain led to the discovery of a vast enterprise leveraging sports sponsorships for Chinese organized crime.

Read more
Report

Maël Le Touz, Jacques Portal, Renée Burton,
and Elena Puga
July 22, 2024

Vigorish Viper: A Venomous Bet

This groundbreaking report unveils the discovery of a technology suite and its connection to Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia.

Read more
Press Release

Infoblox Threat Intel
July 17, 2024

Revolver Rabbit’s Million-Dollar Masquerade: Infoblox Uncovers The Hidden World of RDGAs

Santa Clara, Calif., July 17, 2024 — Infoblox Threat Intel released a threat landscape study of the use of registered domain generation algorithms (RDGAs) by malicious actors today.

Read more
Blog

James Barnett
July 17, 2024

RDGAs: The Next Chapter in Domain Generation Algorithms

Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs that our research has found are often used to host phishing and scam sites and deliver malware.

Read more
Research Report

Infoblox Threat Intel
July 17, 2024

REGISTERED DGAs: The Prolific New Menace No One Is Talking About

Registered domain generation algorithms (RDGAs) are a programmatic mechanism that allows DNS actors to create many domain names at once or over time to register for use in their infrastructure.

Read more
Blog

Renée Burton and Dave Mitchell
June 3, 2024

What a Show! An Amplified Internet Scale DNS Probing Operation

Learn how Chinese actors are probing DNS networks around the world and how an attack surface management tool is amplifying the suspicious activity.

Read more
Blog

Infoblox Threat Intel
May 28, 2024

VexTrio Viper Adds a New DNS TDS Domain

Learn how VexTrio Viper adapts to industry reporting and about the role of Infoblox Threat Intel in identifying and responding to these changes. Despite their adaptations, VexTrio Viper is still detectable.

Read more
Blog

Dr. Renée Burton
April 29, 2024

Muddling Meerkat Blog Post

This paper introduces a perplexing actor, Muddling Meerkat, who appears to be a People’s Republic of China (PRC) nation state actor.

Read more
Report

Infoblox Threat Intel
April 29, 2024

Muddling Meerkat Report

Sometimes there are threats we can observe but not fully understand. This might be doubly
true when the evidence comes from Domain Name System (DNS) logs.

Read more
Solution Note

Infoblox
April 26, 2024

Threat Insight

Real Time Inspection of Enterprise Network DNS Traffic to Detect Unknown Threats.

Read more
Solution Note

Infoblox
April 26, 2024

Infoblox Threat Intel

Uplift the entire security stack by optimizing your custom blend of threat intelligence.

Read more
Blog

Infoblox Threat Intel
February 28, 2024

Beware the Shallow Waters: Savvy Seahorse Lures Victims to Fake Investment Platforms Through Facebook Ads

Learn how the threat actor Savvy Seahorse Facebook ads to lure users to fake investment platforms and leverages DNS to allow their attacks to persist for years.

Read more
Media Article

Bleeping Computer
February 28, 2024

Savvy Seahorse gang uses DNS CNAME records to power investor scams

A threat actor named Savvy Seahorse is abusing CNAME DNS records Domain Name System to create a traffic distribution system that powers financial scam campaigns.

Read more
Blog

Infoblox Threat Intel
February 20, 2024

Ivanti Connect Secure VPN Exploitation – Correctly Interpreting DNS IoCs

Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can’t simply be added to a blocklist.

Read more
Media Article

Tech Republic
February 9, 2024

Infoblox says IT Pros are Missing this Mega-Threat from Organised Global Cyber Criminals

Cyber security threat actor VexTrio is flying under the radar for most APAC region cyber security professionals because it is a web traffic distribution middle man rather than an endpoint source of malware.

Read more
Blog

Infoblox Threat Intel
January 23, 2024

Cybercrime Central: VexTrio Operates Massive Criminal Affiliate Program

DNS threat actor VexTrio runs a large-scale criminal affiliate program including ClearFake and SocGholish actors.

Read more
Solution Note

Infoblox
October 31, 2023

DNS-Based Threat Hunting For Unveiling Threats Early Before They Strike

The scope of DNS is enormous. There are now 1589 top level domains and 200,000 new
domains are created everyday.

Read more
Blog

Infoblox Threat Intel
October 31, 2023

Prolific Puma: Shadowy Link Shortening Service Enables Cybercrime

Learn how a link shortening service that supports cybercrime remained undetected for years and was discovered via Domain Name Service (DNS) analytics.

Read more
Media Article

Krebs on Security
October 31, 2023

.US Harbors Prolific Malicious Link Shortening Service

The top-level domain for the United States — .US — is home to thousands of newly-registered domains tied to a malicious link shortening service that facilitates malware and phishing scams, new research suggests.

Read more
Blog

Infoblox Threat Intel
October 3, 2023

Lookalike Domain Attacks are on the Rise. Be on the Lookout for these Four Types

Explore the rise of lookalike domain attacks and their potential threats.

Read more
Webinar

Dr. Renée Burton
September 5, 2023

Decoy Dog is No Ordinary Pupy: Separating a Sly DNS Malware from the Pack

In April 2023, Infoblox disclosed the discovery of Decoy Dog, a malware toolkit that uses the domain name system (DNS) to perform command and control (C2).

WATCH NOW
Blog

Infoblox Threat Intel
July 25, 2023

Decoy Dog is No Ordinary Pupy: Separating a Sly DNS Malware from the Pack

The article provides a brief overview of our conclusions. Get the full report, including our Decoy Dog YARA rule, here and read the original paper here.

Read more
Report

Infoblox Threat Intel
July 25, 2023

Decoy Dog is No Ordinary Pupy: Separating a Sly DNS Malware from the Pack

Decoy Dog is a malware toolkit discovered by Infoblox that uses the domain name system (DNS) to perform command and control (C2).

Read more
Report

Infoblox Threat Intel
April 24, 2023

A Deep3r Look at Lookal1ke Attacks

Threat actors have used visually similar domains to deceive users into visiting malicious websites since the advent of the internet.

Read more

All Resources

View All
Back To Top
Close mobile menu