BloxOne Presentation
BloxOne Presentation
Presenter
Date:
DNS Exploitation
Increased Attack Surface
Mobility & Cloud
APTs/Cyberware
Worms Spyware/Rootkits
THREATS
SD-WAN
Shifting perimeter. Direct Direct connection to Internet with Endpoint security cannot be
access to cloud applications no ability to replicate full HQ deployed on lightweight IoT
from everywhere security stack devices
But, new risk does not always equal need for a new tool!
3 | © Infoblox Inc. All rights reserved.
Malware Can Infiltrate from Any Point
More ways in…
Mobile
Saas
Internet
Branch Office
Campus
PoS
Remote Office
IoT
Cloud
Saas
30+
security tools in
operation, with staff and
expertise to manage 12
How can I do
more with less?
How do I
simplify?
Build adaptive
security Protect data and
architectures critical
Improve infrastructure
compliance
2
Website Request
Website delivers
2 initial exploit
CnC Request
1
3 INTERNET
Initial dropper
2
X X
Website Request
CnC Request
Connection to malicious
2 website blocked at DNS
Initial dropper INTERNET
Malicious Payload 3
2
Malware on device seeks
1 sensitive data DNS
Core Security
Traditional security does not Compromised Device Stack
3 inspect
DNS traffic
Sensitive data tunnelled over DNS protocols to avoid detection
2
DNS with threat intelligence
1 and analytics DNS
1 DNS
Core Security
Data prevented from exiting Compromised Device Stack
enterprise by blocking DNS
3 request
to destination
Attempted data exfiltration over DNS protocols detected and blocked
1 2
Internal DNS Resolver DoH INTERNET
3 bypassed, and DNS traffic DoT
DNS
(TLS or
not inspected Encrypted
Encrypted HTTPS)
DNS
DNS
Query
Network Device
Query Core Security
Stack Unauthorized
Resolver
Attackers can exploit DoT
4
for their own purpose
DoT/DoH “HIDES” DNS traffic from your security tools
Circumventing internal
1 1 3
DNS is a bad idea DNS
TLS
Block Access to
2 unauthorized DNS
servers
4 2
Use internal DNS vendor that DoH INTERNET
3 supports DoT to retain DoT X DNS
(TLS or
control and security Encrypted
Encrypted HTTPS)
DNS
DNS
Query
Network Device
Query Core Security
Stack Unauthorized
Block DoH using Threat Resolver
4 Intel List of Canary and
unauthorized resolvers DoT/DoH Best Practices protects your users and devices
DNS
Dossier Ecosystem TIDE Threat Insight Firewalling/RPZ • Infrastructure Load
• Alerts
Cloud
IoT
Remote Locations
Corporate Network
• Preserving processing power of
IoT
perimeter security
Secure Web
Gateway
Protect All Devices
IDS/IPS
• Foundation of DHCP, IPAM, DNS
Rogue Devices
• Widespread protection for
• All enterprise devices
• All IoT devices
Legitimate
Traffic • Rogue devices
Malicious
Traffic BloxOneTM
Threat Defense
Investigation
Next-gen
Endpoint Security
Vulnerability Analysts
Management
Network Access
Control (NAC) Security Alerts
SIEM / SOAR
ITSM
Context
DNS
• Malicious activity inside the security
Next-gen perimeter
Endpoint Security DHCP • Includes BYOD and IoT device
• Profile device & user activity
Vulnerability Analysts
IPAM
Management
DHCP
DNS Device Audit Trail and Fingerprinting
Network Access • Device info, MAC, lease history
Control (NAC) BloxOneTM Security Alerts
Threat Defense IPAM
Application and Business Context
• “Metadata” via Extended Attributes:
Owner, app, security level, location,
ticket number
Enriched SIEM / SOAR • Context for accurate risk assessment
and event prioritization
Automated ITSM
Network
Vulnerability Access Control Next-gen
Management Endpoint Security DNS
• Malicious activity inside the security
perimeter
Web
SIEM Gateway • Includes BYOD and IoT device
• Profile device & user activity
Threat
Intelligence
ITSM
DHCP
Platform (TIP) Device Audit Trail and
Fingerprinting
• Device info, MAC, lease history
Advanced
Threat SOAR
Detection
IPAM
Application and Business Context
• “Metadata” via Extended Attributes:
Owner, app, security level, location,
ticket number
• Context for accurate risk assessment
Prioritize 100s of alerts | Automate incident response | Reduce cost of human touch/error and event prioritization
Remote user
• Detect more threats in the
Data center
cloud
• Resiliency and
redundancy
HQ,
Branch offices
“The hybrid cloud will be used more regularly. Organizations looking to exercise the advantages
of the cloud without giving up proximity to data and security will invoke the hybrid cloud.” - Comport
Technology Solutions
2/3
reduction in threat
3x
more productivity
response time from threat analysts
5. Infoblox switched
to block mode
2. A ‘how’s it going’ visit
shortly after revealed several
malware hits in reports
Value to customer:
• Ability to quickly identify and prioritize what client IP is most
concerning and act in real-time to block the threats
• Leverage IPAM data and syslog for discovery/investigation
• Allow security team to see threat before causing further damage
Value to customer:
• Ease of deployment: Ability to seamlessly enhance existing DDI
infrastructure with security
• Data Protection: Ability to detect and block data exfil in real time
• Brand protection: Help protect the Hospitals name, reputation
Certified Support & R&D 4 Support Centers BloxCare Premium 5000+ Discussions
Manage 70000+ Appliances (US, India, Malaysia, The Netherlands) BloxCare Elite Blogs. Tech Articles.
Phone, Online Support Technical Account
Portal, 22 HW Hundreds of Experts
Manager
Replacement Depots Learn. Share. Network.
Automation/integrations - faster
incident response than non-
integrated security tools
Threat Feeds Basic (8) Intermediate (19) Intermediate (19) Advanced (26)
• Phishing emails
– Emails that include malicious attachments
• Drive-by web attacks
– Occurs when a person visits an infected website where malware is
downloaded and installed without the person’s knowledge
• Watering Hold Sites
– Malicious files or links on “watering hole” sites that are known to be visited
by intended victims
DNS RPZ
How it Works DNS threat intelligence
service
IPs, domains, etc. of bad
servers
INTERNET
Malware/APT INTRANET
DNS Server
DE DP Detection Processes DNS Firewalling & Threat Intelligence for Malware Detection
Advanced DNS Protection – DDoS Detection
RS MI Mitigation DNS Firewalling – STIX, REST APIs
Accurate Verified data sets with less than .01% false positives
Contextual Data include why it’s a threat, and what other indicators
are related to it
Phishing &
Government Malware URLs Various WWW
TIDE* file
Marketplace Define Data Policy, Spambot IPs formats
Governance &
Translation
Custom TI C&C & Malware
Host/Domain DNS
Falcon
Intelligence
Emerging Threats
Dossier
Investigate SIEM
Threats
Threat Track
* Threat Intelligence Data Exchange
NGFW DNS
Insights to Monitor, Analyze and Secure the Network, Devices and Applications • Information on active devices
Security Admin
• Malware C&C • DGA and Fast Flux
• Malware download • DNS tunneling
• See response hits per security policy, top malicious
• Exploit kits • Data Exfiltration domains, top clients with hits
• APT • DNS Messenger • Double click on threat categories, sub categories
• Get IP metadata
• Apply different policies for different user segments
• Set policy precedence for various categories
Security Researcher
• Drill down details on origin of malicious activity, device
and logged in user
• Schedule any report to be emailed at specified time-
periods
IT Business
• Data privacy and unique API key for authentication • Daily backup for configurations, policy, and device data
DNS
commands Data
• Enables attackers to easily insert malware, pass stolen INTERNET
– Iodine
NameMarySmith.foo.thief.com
– OzymanDNS MRN100045429886.foo.thief.com
DOB10191952.foo.thief.com
– SplitBrain Infected
endpoint
– DNS2TCP
account.paypal.co.uk[.]rlsg4
2
Malware uses same
2 algorithm to “look”
for CnC server
INTERNET
9uZGF5LCA.com
V2VkbmVzZ.com
TW9uZGF5LCAxc.com
3
Core Security
Successful domain allows Compromised Device Stack
3 malware to connect to TW9uZGF5LCAxc.com
malicious destination
Threat Intel is ineffective against this attack method
Data Connector
gathers DDI data,
filters out legitimate
activity and sends
suspicious event info
to SIEM
58 |
• Helps Guide Security Analysts
© Infoblox Inc. All rights reserved.
BloxOne® Threat Defense Advanced
SIEM
Firewall