Secure your public DNS presence from subdomain takeovers and dangling DNS exploits 

Challenge: Eliminating dangling DNS records from a large public DNS presence

A U.S. healthcare company recently became aware that they were vulnerable to attack due to dangling DNS records that were active across their public DNS presence. 

Dangling DNS records are obsolete or misconfigured entries in a DNS control panel that point to a domain or resource (such as an IP address, server, or cloud service) that either no longer exist or are no longer associated with the domain in question, such as a CNAME record pointing to a non-existent AWS resource. 

Threat actors exploit dangling DNS records in several ways, including subdomain takeovers, traffic redirection, and cookie exploits that lead to adversaries authenticating themselves on corporate networks. 

Our customer needed a fast and accurate appraisal of how exposed they were to these kinds of attacks, and immediately actionable intelligence on what records were dangling, so that their infrastructure team could resolve the problem before the organization suffered an attack. 

Solution: Locating and removing 2,000+ dangling DNS records 

Silent Push Enterprise edition features a dedicated query that scans an apex domain, and outputs a list of all associated dangling DNS records, including the record itself and the associated subdomain. 

Once a dangling record has been located, security teams are able to log into their organization’s DNS control panel and resolve the problem by removing or amending the record in question. 

Immediately after completing onboarding, our customer ran a dangling DNS query and discovered 2,000+ exploitable DNS records that required immediate resolution before the company was targeted in a subdomain takeover. 

Our customer used the data export feature to obtain the raw data on every exploitable record, before logging into their DNS control panel and remediating the problem by deprovisioning the required records and securing their attack surface from exploits. 

Silent Push Enterprise dangling DNS query

The Silent Push Difference: Ready-made SOC and IR intelligence 

Silent Push Enterprise and Community editions feature a bank of Attack Surface Mapping queries that are designed to provide SOC, IR and Infrastructure teams with immediately actionable intelligence and insights on potential vulnerabilities. 

Silent Push Enterprise customers have access to dedicated dangling DNS records, and scans that reveal 3rd party services linked to a network. 

Our customer was unaware of how exposed they were before they came onboard with Silent Push, and were able to not only remediate an urgent dangling DNS issue, but automate the query to run every 24 hours so that the team are kept constantly in the loop about any exploitable records that may appear in the future. 

Silent Push knows more about global Internet-facing DNS infrastructure than any other provider, which gives our customers the ability to fully enumerate any given attack surface or threat landscape and preemptively resolve exploitable DNS records before they appear on a threat actor’s radar. 

Learn More About Our Unique Approach to Preemptive Threat Intelligence  

Find out how Silent Push helps you to locate hidden and known threat infrastructure, and stop digital assaults at the source before they occur using Indicators Of Future Attack (IOFA)™ 

IOFA™ are domain and IP datapoints that preemptively pinpoint adversary intent BEFORE an attack is launched, and reveal searchable digital fingerprints of attacker activity.

Contact us here for more information, or to discuss how we can help you expose dangling DNS records.

Further Resources 

Our CTO, John Jensen, provided extensive analysis of dangling records and subdomain takeovers in his talk at the VirusBulletin conference 2023. Click here to view the presentation and download the research paper. 

We’ve also blogged about the persistent problem of subdomain takeovers, and how dangling DNS records are a backdoor onto corporate networks. Click here to read our research. 

What are Indicators of Future Attack™?

Indicators of Future Attack™ (IOFA) are actionable, verified datapoints (hostname, domain, IP etc.) that reveal where an attack will be launched from in the future, based on how an adversary manages and deploys their infrastructure. 

IOFA™ are used to create digital fingerprints of attacker activity, which security teams can use to track and monitor the searchable patterns that emerge as threat actors initialize and weaponize their infrastructure. 

In this blog we’ll delve a little deeper into what IOFA™ are, how they expose threat actor infrastructure, how to use them to stop attacks, and why they’re so effective when attempting to locate and block known and hidden threats. 

What problems do Indicators of Future Attack™ solve? 

There is an urgent need for preemptive cybersecurity solutions that minimize risk by stopping attacks at source, instead of waiting for an adversary to fully weaponize their infrastructure in a directed attack.

That is a solid foundation, but it’s a bit of a “marathon sentence.” It packs a lot of information into one go, which can dilute the impact of your main point: that traditional methods are failing.

Here are a few ways to refine it, depending on the tone you’re aiming for:

Option 1: Sharp & Punchy (Best for Executives)

Security leaders are struggling to find proactive defenses in a market saturated with hundreds of options. Most of these solutions rely on traditional, IOC-led strategies that are simply no longer enough to meet modern threats.

Enter stage right: Indicators of Future Attack™. 

The clue’s in the name. It’s not about where an attack has BEEN, it’s about where an attack is coming FROM – whether it’s a threat actor attempting to impersonate your organization online, inject malware onto machines to harvest and steal data, exploit your DNS records, or nation state-backed threat activity aimed at disrupting critical infrastructure. 

What do Indicators of Future Attack expose? 

IOFA™ preemptively reveal attacker intent and counteract threat infrastructure as it’s being setup by focusing on an adversaries Tactics, Techniques and Procedures (TTPs), rather than waiting for an attack to be launched and the information to be publicly known – by which time it’s often too late, and the damage is done. 

Would you rather be alerted when a burglar is on their way to your house, or at your door, looking through the window for ways to break in? IOFA™ act as digital roadblocks, allowing you to take proactive steps to ensure they never arrive at your property. 

As well as emerging domains and IPs that are yet to be fully deployed, IOFA™ can also be used to locate and block infrastructure that has already been involved in an attack.

Why are Indicators of Future Attack™ so effective? 

Threat actors operate like a business, and like any other business, they adhere to a set of verifiable rules that produce results (i.e. a successful breach). To achieve this, APT groups setup and manage their infrastructure to a series of identifiable patterns. 

IOFA™ allow security teams to turn the tables and use an adversary’s own attack strategies against them, by shadowing their deployment techniques and blocking infrastructure the moment it’s setup. 

Threat actors recycle through hostnames and IPs at a rapid rate to evade detection, rendering most IOC-based feeds obsolete the moment they’re setup. 

By targeting the rules that govern how those same hostnames and IPs are deployed, IOFA™ are not only able to counteract the thin end of the wedge – infrastructure involved in an attack – but any associated infrastructure that’s lurking in the background, ready to strike. 

How are Indicators of Future Attack™ used to stop attacks? 

IOFA™ have numerous practical uses that fulfil a range of cybersecurity functions, with the end goal of providing security teams with an early warning system that alerts them to emerging attacks. 

Here’s a few notable applications: 

Early detection feeds 

Domain and IP IOFA™ are used to construct automated threat feeds in Silent Push Enterprise, containing hidden elements of attacker infrastructure as well as known malicious datapoints. 

indicators of future attack feed analytics

Silent Push Threat Analysts create and update IOFA™ Feeds that counteract high-profile named APT groups (e.g. Lazarus, Scattered Spider), which Enterprise customers use as finished intelligence within their detection and blocking mechanisms. 

Enterprise users are also able to create their own feeds, built on Silent Push queries that output IOFA™ relevant to their organization and area of operation. 

Data correlation via integrations 

IOFA™ can be passed through an organization’s security stack using the Silent Push API and a range of native integrations with leading cybersecurity vendors, to enrich existing datastreams with a wealth of DNS and content-based categorization. 

Utilizing IOFA™ data within other software platforms alerts teams to infrastructure that isn’t on their radar, and allows for faster and more effective discovery of all the hostnames and IPs associated with a given threat, including those lurking under the surface of an attack. 

TLP Amber reports 

Silent Push Enterprise edition customers have access to TLP Amber reports, written and curated by our team of Threat Analysts, that perform a deep dive into high profile APT activity and contain lists of IOFA™ associated with a given campaign. 

Our TLP Amber reports contain proprietary information on named threat campaigns, including the queries used to track how infrastructure is being setup and managed, that SOC and IR teams use as immediately actionable intelligence to stop emerging attacks, and gather intelligence on known threats.

Why are Indicators of Future Attack™ unique to Silent Push? 

Silent Push is the only cybersecurity vendor that outputs IOFA™.

No other platform has the same ability to map out the relationship between billions of disparate hostnames and IPs in a way that reveals adversary TTPs at the earliest possible stage, allowing teams to stay one-step ahead of a given campaign before it’s fully initialized without needing to rely on post-breach IOCs. 

Our data is all our own. IOFA™ are generated from a powerful first-party dataset that scans and correlates the global IP range, and joins the dots across the IPv4 range in a way that makes it immediately obvious where the next digital assault is likely to originate from. 

Categorization 

IOFA™ aren’t used in isolation. We apply 150+ proprietary categories to each IOFA™ the platform outputs, that allows teams to understand the relationship a domain or IP address has with the rest of the Internet, including how it’s moved between hosts, its risk level, and how it’s managed in relation to known malicious indicators. 

Learn more about our unique approach to preemptive cyber defense  

If you’re interested in learning about how IOFA™ can help you to locate hidden and known threat infrastructure, and stop digital assaults at source before they occur, contact us for more information.