Spamhaus Technology and abuse.ch Logo
Solutions
Data
Email & Network
Cyber Threat Intelligence
Resources
About
Back to Previous Page

Blog

Choking the botnets – DNS Firewall protecting a client’s users across the USA

Posted on
December 23, 2016
Author
Barry Branagh
Read time
1 mins

In this guide

IntroductionContent
Introduction

Introduction

Spamhaus’ DNS Firewall service successfully protected a customer over the weekend from over 10,000 attempted connections to a C&C server that was distributing malware.

Content

Users across the USA have been protected from a compromised ad-blocker site thanks to Spamhaus Response Policy Zone blocklist identifying it as being a botnet command and control server.

A US-based multi-site operation uses ad-blockers as a standard tool to stop unwanted pop-ups, drive-by malware sites and just nuisance network activity. But when the ad-blocker was compromised, each connection to it could carry a threat with the potential damage escalating rapidly as automated, constant connection to ad-blockers is needed for them to be effective.

However with the compromised server’s domain identified as being under botnet control on Spamhaus DNS Firewall Threat Feeds, the botnet threat was choked with more than 10,000 queries to the compromised machine blocked in 48 hours.

Sign up for a free 30-day trial for DNS Firewall here.