Results of the Infoblox Security Assessment report 1Q2016
Craig Sanderson, senior director of security products at Infoblox

Results of the Infoblox Security Assessment report 1Q2016

Infoblox has announced results of the Infoblox Security Assessment Report for the first quarter of 2016, which finds that 83%—more than four out of five—of enterprise networks tested by Infoblox show evidence of malicious DNS activity.

Infoblox offers free security assessments to customers and prospective customers, identifying DNS queries inside an organisation’s network that are attempting to reach known malicious or suspicious domains. External threat data from these evaluations is anonymised and aggregated to produce the Infoblox Security Assessment Report.

In the first quarter of 2016, 519 files capturing DNS traffic were uploaded to Infoblox for assessment, coming from 235 customers across a wide range of industries and geographies. Infoblox found 83% of the files showed evidence of suspicious DNS activity.

“This result is consistent with what security professionals have been saying for some time: Perimeter defence is no longer sufficient, because almost all large enterprise networks have been compromised to a greater or lesser extent,” said Craig Sanderson, senior director of security products at Infoblox. “The new mandate for enterprise security teams is to quickly discover and remediate threats inside the network, before they cause significant damage.”

The specific threats found in files during the first quarter, by percentage, are:

  • Botnets – 54%
  • Protocol anomalies – 54%
  • DNS tunneling – 18%
  • ZeuS malware – 17%
  • Distributed denial of service (DDoS) traffic – 15%
  • CryptoLocker ransomware – 13%
  • Amplification and reflection traffic – 12%
  • Heartbleed – 11%

“The prevalence of these attacks shows the value of DNS in finding threats aimed at disrupting organisations and stealing valuable data, as well as the extent to which organisational infrastructure can be hijacked to mount attacks on third parties,” said Sanderson. “The good news is that DNS is also a powerful enforcement point within the network. When suspicious DNS activity is detected, network administrators and security teams can use this information to quickly identify and remediate infected devices—and can use DNS firewalling as well to prevent malware inside the network from communicating with command-and-control servers.”

The full Infoblox Security Assessment Report for the first quarter of 2016 is available at www.infoblox.com/resources/report/infoblox-security-assessment-report-2016-q1. Organisations seeking a free Infoblox security assessment should visit www.infoblox.com/free-malware-report.

Click below to share this article

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive