<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Every month, the ThreatSTOP Security, Intelligence, and Research team works to expand our proactive protections against emerging threats. This month marks a significant leap forward in safeguarding customer environments, with new detection feeds, improved domain intelligence, and enhanced IP-based monitoring to stop attacks before they impact your business. <span>&nbsp;&nbsp;<span style="font-weight: bold;">We ask you to please read this blog in its entirety, as it may require action on your part.</span></span></p> <!--more--><p><strong>1. Crypto Mining IP Detection</strong> <span>&nbsp;</span></p> <p>We have closed a four-year gap in actionable cryptomining coverage. Our new intelligence now conquers not just domains, but also IPs of Crypto Miners.&nbsp;</p> <p><strong>2. New Ad Detection Feed</strong> <span>&nbsp;</span></p> <p>Online advertising is a core part of today’s web, but it is also a major channel for hidden threats such as malware delivery, phishing redirects, tracking based data exfiltration, and command and control activity. ThreatSTOP now gives customers the ability to block these risks outright. Our Security, Intelligence, and Research team maintains continuously updated intelligence on malicious advertising servers, powering both DNS Defense and IP Defense to stop dangerous ad domains, prevent redirects, and block connections to known bad infrastructure before harm occurs. With flexible enforcement bundles for both domains and IPs, organizations can proactively reduce exposure to malvertising and other ad based threats. &nbsp;Read our blog post <a href="/blog/strengthening-your-network-against-malicious-advertising-services" rel="noopener" target="_blank">here</a> for more information.</p> <p><strong>3. BadTLDv2 – Expanded Malicious Domain Detection</strong> <span>&nbsp;</span></p> <p>This tool is a DNS hunting sensor that looks for potential DNS tunnels by combining two independent views of the internet. The script focuses on three behaviors that are common in DNS abuse. First, it looks for CNAME records under custom top level domains that an operator has tagged as risky, which often show up in command and control or tunneling frameworks. Second, it searches for domain labels that contain malicious looking strings (<em>details intentionally omitted, trade secrets and all</em>), a pattern that frequently signals encoded data rather than human readable names. Third, it flags IPv4 A records that point to unreachable IP addresses which are unusual in normal web browsing but attractive for covert channels.</p> <p><strong>4. APWG Malicious IPs</strong><span></span></p> <p>In collaboration with our partners at APWG, we've rolled out a significant enhancement to the tracking of malicious IP addresses. &nbsp;This detection has been added to our "Malware - IPs" target in the Command &amp; Control bundle. &nbsp;If you are using the Malware - IPs target, you don't need to do anything. &nbsp;This detection is already in your policy.</p> <p><span style="font-weight: bold;">5. Dynamic DNS Detection</span></p> <p>In our recent development efforts to enhance security monitoring, we've implemented a new detection mechanism specifically designed to identify Dynamic DNS activities across our environments. &nbsp;Complementing this detection, we've also introduced a Dynamic DNS IP target configuration to streamline and centralize the input process. &nbsp; This Target is in our&nbsp;<span style="font-weight: bold;">Corporate Policy - IPs</span><span style="font-weight: normal;">, bundle. &nbsp;This is a relatively new Bundle to our detection, and not many customers have looked into this. &nbsp;We recommend following up with this bundle to evaluate if it's a good use for you, or ask our support team about it.</span></p> <p><span style="font-weight: normal;"><span style="font-weight: bold;">6. Reclassifying Ransomware</span><br></span></p> <p><span>An adjustment was made to how we classify Ransomware Domains and IPs within our system. &nbsp;The only effect that this has for the customer is making Targets easier to select and sort by in the interface.</span></p> <p><span><span style="font-weight: bold;">7. Domain Parking Detection</span><br></span></p> <p>A&nbsp;<em style="font-weight: normal;">significant&nbsp;</em>enhancement was made using&nbsp;<span style="font-weight: bold;">visual Machine Learning</span><span style="font-weight: normal;"> to our parked domain detection. &nbsp;This should help stop instances where multiple parked domains are used to send a malicious page towards your system. &nbsp;You may have seen something like this when you click or tap on something and suddenly your screen is filled with warnings about your system needing antivirus protection, or your system being compromised.</span></p> <p><span style="font-weight: normal;"><span style="font-weight: bold;">8. Allow listing enhancements</span><br></span></p> <p><span>One of the hardest parts about maintaining block lists is maintaining lists of "clean" networks. &nbsp;Perhaps those networks aren't necessarily&nbsp;<em>clean</em> per se, but blocking them would cause significant damage to the normal operations of the Internet. &nbsp;For example, certain CDNs, while handy, may also host malicious traffic, so while blocking the CDNs IP addresses may be the obvious solution, it will break benign traffic as well. &nbsp;</span></p> <p style="font-weight: bold;"><span>9. Gambling Targets</span></p> <p>As part of our ongoing effort to streamline and simplify our detection system, we implemented a series of targeted updates designed to reduce exposure to gambling-related content. For instance, in this particular case, we had multiple targets that safeguarded customers from this content. These targets were consolidated into a single target for enhanced usability.</p> <p style="font-weight: bold;">10.&nbsp;<span style="font-weight: bold;">BlueSky Detection</span></p> <p style="font-weight: normal;"><span>BlueSky was added to our "Social Media" Bundle. &nbsp;Allowing customer to block or control the usage of BlueSky on their networks.</span></p> <p style="font-weight: bold;"><span>11.&nbsp;<span style="font-weight: bold;">Bundles</span></span></p> <p>Have you made the switch from using individual targets to Bundles? &nbsp;Bundles are a not only a collection of Targets to make things easier to manage, bundles allow us (the Security, Intelligence, and Research team) to dynamically update your detection by moving and adding things to Bundles. &nbsp;This way, your detection is constantly updated without your having to reconfigure your policy.</p> <p>We especially ask you to look into the&nbsp;<span style="font-weight: bold;">Command and Control</span><span style="font-weight: normal;"> Bundle, which should be on by default, in every customer environment.</span></p> <h3><strong>How ThreatSTOP Protects You</strong></h3> <p>All these new enhancements directly power our <strong>Protective DNS solutions</strong> (DNS Defense and DNS Defense Cloud) as well as <strong>IP Defense</strong>, ensuring you can: <span>&nbsp;</span></p> <ul> <li>Block cryptomining traffic before it consumes resources <span>&nbsp;</span></li> <li>Stop command-and-control communications at the DNS and IP layers <span>&nbsp;</span></li> <li>Detect and disrupt phishing, spam, and data exfiltration attempts <span>&nbsp;</span></li> <li>Leverage actionable threat intelligence across routers, firewalls, IPS, and cloud environments like AWS WAF <span>&nbsp;</span></li> </ul> <p>By continuously refining our detections, ThreatSTOP ensures your security posture evolves faster than the threats targeting your organization. <span>&nbsp;</span></p> <h3><strong>Ready to Enhance Your Security?</strong></h3> <p>For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our <a href="/threatstop-platform" rel="noopener" target="_blank"><strong>product page</strong></a>. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers! <strong>Get started with a Demo today!</strong> <span>&nbsp;</span></p> <p><strong>Connect with Customers, Disconnect from Risks.</strong> <span>&nbsp;</span></p></span>