Spamhaus' DNS Firewall service successfully protected a customer over the weekend from over 10,000 attempted connections to a C&C server that was distributing malware.

Users across the USA have been protected from a compromised ad-blocker site thanks to Spamhaus Response Policy Zone blocklist identifying it as being a botnet command and control server.

A US-based multi-site operation uses ad-blockers as a standard tool to stop unwanted pop-ups, drive-by malware sites and just nuisance network activity. But when the ad-blocker was compromised, each connection to it could carry a threat with the potential damage escalating rapidly as automated, constant connection to ad-blockers is needed for them to be effective.

However with the compromised server’s domain identified as being under botnet control on Spamhaus DNS Firewall Threat Feeds, the botnet threat was choked with more than 10,000 queries to the compromised machine blocked in 48 hours.

Sign up for a free 30-day trial for DNS Firewall here.

Related Products

Resources

Take control of the ‘risk’ factor and choose your DNS Firewall Threat Feeds wisely

17 March 2019

Blog

When choosing DNS Firewall Threat Feeds its key to ensure you pick the right ones based on the relevant level of protection your business requires, otherwise you could be making things more tricky than they need to be.

What is DNS Firewall? A beginner’s guide

14 September 2018

Blog

With the ever increasing demands on IT, security and networking teams, tools that reduce workloads, which don't cost the earth, are always welcome. One such tool is DNS Firewall. Find out how it works, and the benefits it provides.

10 questions to ask a potential DNS Firewall provider

11 September 2018

Blog

With such a huge growth in the DNS Firewall market over the past few years there are plenty of options to choose from. Read our Top 10 questions for your next DNS Firewall provider.