WisdomInterface

It Is Always DNS, SUNBURST Confirms

Workforce DNS usage grew by 250% during the pandemic, making DNS a choice pathway for attackers to hide. SUNBURST, an advanced and sophisticated supply chain attack that exposed 18,000 unsuspecting companies, used innovative ways to exploit DNS. How can you ensure that your security stack will catch the next attack hiding in DNS?

In this webcast, author and analyst Deb Radcliff sits down with ExtraHop network security expert Tanner Payne to discuss ExtraHop research insights and her recently published white paper, SolarWinds SUNBURST DNS Abuse Tactics. The talk will include DNS exploit detection demos and cover:

  • Novel ways SUNBURST exploited DNS.
  • How it used malicious DLLs that looked like they belonged to SolarWinds and encoded unique identifiers into the DNS queries to identify high-value targets.
  • Why traditional security missed it and why the network detection and response (NDR) can catch the next one.
Speakers:
  • Deb Radcliff, Cybersecurity Analyst and Author
  • Tanner Payne, Sr. Sales Engineer, ExtraHop
SUBSCRIBE

    Subscribe for more insights



    By completing and submitting this form, you understand and agree to WisdomInterface processing your acquired contact information as described in our privacy policy.

    No spam, we promise. You can update your email preference or unsubscribe at any time and we'll never share your details without your permission.