Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
Passive DNS has long been described as a “phonebook for the internet.” In the past, though, it has only been associated with a domain and the IP address to which it resolves. But RiskIQ’s DNS record support has a lot more to offer than just a name and phone number. Using RiskIQ’s globally distributed sensors, along with terabytes of internet crawling data and partner data feeds, PassiveTotal provides insight into the depths of DNS records and their history—insight that truly enriches investigations.
The latest release of PassiveTotal now includes more of the DNS records RiskIQ has been collecting over the years. Historically, PassiveTotal has focused on displaying “A” records, which dictate the IP address a given domain should resolve to when querying DNS. These records are immensely useful but are only one of the types of DNS record that can provide analysts with interesting leads. The most recent platform update, however, also brings support for MX (mail exchanger), NS (nameserver), TXT (text), SOA (start of authority), and CNAME (canonical name) records to PassiveTotal.
Fig-1 Example highlighting the new DNS tab and filters
Community users of PassiveTotal will now see a “DNS” tab inside of their search results when these new DNS records are available. Similar to existing tab behaviors, users can apply various filters, add indicators to their existing projects, or pivot on new leads to perform a new search.
Fig-2 Another example of different records for the DNS tab
Supporting these new record types is exciting because they are proven to open up new research leads for analysts. For example, some malicious actors will stand up specific nameservers (NS records) to segment their infrastructure or configure a mail provider (MX records) to administer their command and control channel. Seeing these new records inside of PassiveTotal means an analyst can now pivot off those values to correlate more of the actor’s infrastructure.
Fig-3 Example record where SOA reveals actor email address
More complex record types like SOA and TXT offer unique information about adversary infrastructure. For example, when registering a domain, a valid email address is needed to complete the process. Sophisticated actors may choose to privacy protect their information, but unbeknownst to them, their original email address may get placed inside an SOA record that is associated with the DNS zone. Analysts can perform a search in WHOIS data to surface more domains registered using that email.
We’ve been using this new feature inside of RiskIQ for a few weeks now and have already come to rely on it as a vital data set to check when performing pivots inside of the platform. If you have a story where you found new leads because of the DNS tab, we’d love to hear it. Send your stories or other feedback over to email@example.com!
Sign up for a free PassiveTotal account to check out the new features, and see what else is new in the platform here. If you’re already a user, click here to login and experience our improved DNS record support.
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
🛡️#CyberSecurityBrief #Alert: @FTC Refunds Victims Of @OfficeDepot Tech Support Scam via @BleepinComputer @AthertonLab #CyberSecurity #InfoSec #Malware #Ransomware #DDoS #DataBreach #ITsecurity #CyberThreats #CloudSecurity #CyberSecurityInsights https://cybersecurityinsights.substack.com/p/your-friday-morning-cybersecurity?r=63k3&utm_campaign=post&utm_medium=web&utm_source=twitter
At #RSAC2020, stop by the @CrowdStrike booth on Tuesday at 11:30 to see the RiskIQ Illuminate app in action! It analyzes CrowdStrike endpoint coverage and compares it to RiskIQ's unmatched external data to provide a 360-degree view of your attack surface: https://bit.ly/2ujagwt
Credit Card Skimmer Found on Nine Sites, Researchers Ignored - by @Ionut_Ilascu
Looking for plans in San Francisco Monday night during #RSAC 2020? You're invited to party with RiskIQ at IGNITE, hosted by @FlashpointIntel! RSVP today: https://bit.ly/2R1SPJe