Content
Users across the USA have been protected from a compromised ad-blocker site thanks to Spamhaus Response Policy Zone blocklist identifying it as being a botnet command and control server.
A US-based multi-site operation uses ad-blockers as a standard tool to stop unwanted pop-ups, drive-by malware sites and just nuisance network activity. But when the ad-blocker was compromised, each connection to it could carry a threat with the potential damage escalating rapidly as automated, constant connection to ad-blockers is needed for them to be effective.
However with the compromised server’s domain identified as being under botnet control on Spamhaus DNS Firewall Threat Feeds, the botnet threat was choked with more than 10,000 queries to the compromised machine blocked in 48 hours.
Sign up for a free 30-day trial for DNS Firewall here.