Skip to main content

Many enterprise networks show signs of malicious DNS activity

posted onJune 17, 2016
by l33tdawg

More than four fifths of recently tested enterprise networks have shown evidence of malicious DNS activity.

Those are the results of a new report by Infoblox, the network control company. It analysed 519 files capturing DNS traffic, from 235 customers in various verticals, during the first quarter of 2016. In 83 per cent of cases, ‘suspicious’ DNS activity was found.

The most common threats are botnets (54 per cent) and protocol anomalies (54 per cent), followed by DNS tunnelling (18 per cent), ZeuS malware (17 per cent) and Distributed denial of service (DDoS) traffic (15 per cent). Other threats include Cryptolocker ransomware, amplification and reflection traffic, and heartbleed.

Source

Tags

Security

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th