Dns Security Service

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

DNS Security

Service
Apply predictive analytics to disrupt
Benefits ­attacks that use DNS for command
• Predict and block new ­malicious
domains with ­machine learning
and control or data theft
• Neutralize DNS-based tunneling The Domain Name System (DNS) is wide open for
• Simplify security with ­automation attackers. According to Palo Alto Networks Unit 42 threat
and replace standalone tools research team, almost 80% of malware uses DNS to initiate
command-and-control (C2) procedures. Unfortunately,
security teams lack basic visibility into how threats use
DNS to maintain control of infected devices.

It’s impossible to keep up with the high volume of malicious


domains, let alone advanced tactics like DNS tunneling for
stealthy data theft. Current approaches lack automation—
requiring changes to DNS infrastructure—or drown you in
uncoordinated data from independent tools. It’s time to
take back control of your DNS traffic.

Strata by Palo Alto Networks | DNS Security Service | Datasheet 1


Block known Predict with Identify DNS
DNS bad domains machine learning tunneling

Passive DNS WildFire

DNS data Protections NGFW

Infinite scale
Honeynet URL Filtering

Cyber Threat Unit 42


Alliance

Figure 1: Rich DNS data powers machine learning for protection

DNS Security Service ­ ontinuously growing global threat intelligence. Your protec-
c
Palo Alto Networks DNS Security service applies predictive tion continues to grow with data from a large, expanding threat
analytics to disrupt attacks that use DNS for C2 or data theft. intelligence sharing community. Our malicious domain data-
Tight integration with Palo Alto Networks Next-Generation base has been gathered over years, with sources including:
Firewalls gives you automated protection and eliminates the • WildFire® malware prevention service to find new C2
need for independent tools. Threats hidden in DNS traffic are ­domains, file download source domains, and domains in
rapidly identified with shared threat intelligence and ma- malicious email links.
chine learning. Cloud-based protections scale infinitely and • URL Filtering to continuously crawl newfound or
are always up to date, giving your organization a critical new ­uncategorized sites for threat indicators.
control point to stop attacks that use DNS.
• Passive DNS and device telemetry to understand do-
main resolution history seen from thousands of deployed
Predict and Block New Malicious next-generation firewalls, generating petabytes of data
per day.
Domains • Unit 42 threat research to provide human-driven ad-
DNS is a massive and often overlooked attack surface pres- versary tracking and malware reverse engineering, in-
ent in every organization. Adversaries take advantage of the cluding insight from globally deployed honeypots.
ubiquitous nature of DNS to abuse it at multiple points of an • More than 30 third-party sources of threat intelligence
attack, including reliable C2. Security teams struggle to keep to enrich our understanding.
up with new malicious domains and enforce consistent pro-
With the DNS Security service, your firewalls can predict
tections for millions of emerging domains at once.
and stop malicious domains from domain generation algo-
The DNS Security service takes a different approach to pre- rithm-based malware with instant enforcement. Malware’s
dicting and blocking malicious domains, giving the advan- use of domain generation algorithms (DGA) continues to
tage back to overwhelmed network defenders. grow, limiting the effectiveness of blocking known malicious
Next-Generation Firewalls protect you against tens of m
­ illions domains alone. DGA malware uses a list of randomly gen-
of malicious domains identified with realtime analysis and erated domains for C2, which can overwhelm the signature

Strata by Palo Alto Networks | DNS Security Service | Datasheet 2


­apability of traditional security approaches. DNS Security
c
deals with DGA malware by using:
Unit 42 Threat Research on OilRig
• Machine learning to detect new and never-before-seen
DGA domains by analyzing DNS queries as they are per- OilRig is an active, organized threat group first dis-
formed. covered by Unit 42. Operating primarily in the Middle
East, OilRig carefully targets organizations to further
• Easy-to-set policy for dynamic action to block DGA do-
its regional strategic goals across multiple industries,
mains or sinkhole DNS queries.
including supply chain-based attacks. As part of its
• Threat attribution and context to identify the malware fam- adversary playbook, the group employs sophisticated,
ily with machine learning for faster investigation efforts. custom DNS tunneling for C2 and data exfiltration. The
A cloud-based database scales infinitely to provide ­limitless use of tunneling includes:
protection against malicious domains. Your protections • ALMA Communicator Trojan, which uses DNS tun-
are always up to date, whether 10,000 or 100 million new neling to receive commands from the adversary and
­malicious domains are created in a single day. As part of the exfiltrate data. The malware employs specially craft-
cloud-based service, all DNS queries are checked against ed subdomains to send data to the C2 server and spe-
our infinitely scalable, cloud-based database in real time cific IPv4 addresses to transmit data from the C2 to
to ­ determine appropriate enforcement action. The DNS the Trojan over DNS requests.
­Security service removes one of the most effective and
• Helminth PowerShell-based Trojan, which can ob-
­widely used methods by which attackers establish C2, and its
tain files from a C2 server using a series of DNS TXT
protection scales ­infinitely, ensuring your Next-Generation
queries repeated every 50 milliseconds, essentially
Firewalls can get ahead of new malicious domains before any
building malware on victim systems through hard-
harm is done.
to-detect increments sent over DNS.
• OilRig’s use of DNS tunneling allows the group to es-
Neutralize DNS Tunneling tablish reliable C2 that can potentially evade existing
defenses to carry out further stages of the attack. Get
Advanced attackers use DNS tunneling to hide data theft or C2 the full details on OilRig from Unit 42’s blog post series
in standard DNS traffic. The sheer volume of DNS traffic often or the interactive Playbook Viewer.
means defenders simply lack the visibility or resources to uni-
versally inspect it for threats. Our DNS Security service lets you:
• Use machine learning to quickly detect C2 or data theft
hidden in DNS tunneling. With historical and realtime Eliminate the need for independent DNS security tools or
shared threat intelligence, our algorithms observe the changes to DNS routing with Next-Generation Firewall inte-
features of DNS queries, including query rate and patterns, gration. Tight integration with the Next-Generation F ­ irewall
entropy, and n-gram frequency analysis of the domains to platform provides a critical new control point to stop attacks
accurately detect tunneling behavior. that use DNS, extending your existing investment. The ser-
• Extend PAN-OS® signature-based protection to ­identify vice ensures you have one device to deploy, with a single set
advanced tunneling attempts. DNS Security expands the of policies to manage. Alerts are coordinated across your en-
native ability of Next-Generation Firewalls to detect and tire security stack, including firewall policy violations, IPS/
prevent DNS tunneling. Protections are scalable and eva- IDS, web security, and malware analysis.
sion-resistant, covering known and unknown variants of Automate dynamic response to find infected machines and
DNS tunneling. quickly respond in policy. When attacks using DNS are iden-
• Rapidly neutralize DNS tunneling with automated pol- tified, security administrators can automate the process of
icy action. DNS tunneling is automatically stopped with sinkholing malicious domains on the firewall to cut off C2
the combination of easy-to-set policy actions on the and rapidly identify infected users on the network. Combin-
Next-Generation Firewall and blocking the parent domain ing malicious domain sinkholing, Dynamic Address Groups,
for all customers. and Logging Actions automates detection and response
workflows, saving analysts time by removing slow and man-
ual processes.
Simplify Security with Seamlessly take advantage of the latest DNS security inno-
­Automation and Replace vations through our extensible, cloud-based architecture.

­Standalone Tools
The DNS Security service is built on a modular, cloud-based
architecture to seamlessly add new detection, prevention,
Security teams need integrated innovations that extend and analytics capabilities with zero customer impact. We will
the value of their existing security investments without continue to use our rich shared threat intelligence and native
­complicating operations. DNS Security takes advantage of enforcement capabilities to deliver new innovations against
the Next-Generation Firewall to stop attacks using DNS, attacks using DNS.
with full automation to reduce manual effort.

Strata by Palo Alto Networks | DNS Security Service | Datasheet 3


Protection Without Performance Impact DNS Security Requirements
Advanced security is seamlessly applied to DNS queries in To use Palo Alto Networks DNS Security service, you will need:
real time with no business impact. The service is hosted on • Palo Alto Networks Next-Generation Firewalls running
our global security service delivery network to provide the PAN-OS® 9.0 or later
low latency and high performance necessary to minimize
• Palo Alto Networks Threat Prevention license
impact to DNS traffic on customer networks.
Licensing Information
Trust and Privacy
The DNS Security license is available as an integrated, c­loud-
Palo Alto Networks DNS Security service has strict privacy and
based service for Palo Alto Networks Next-Generation
security controls in place to prevent unauthorized access to
­Firewalls. It is also available as part of the Palo Alto Networks
sensitive or personally identifiable information. We apply in-
Subscription ELA or VM-Series ELA.
dustry-standard best practices for security and confidentiali-
ty. You can find further information in our privacy datasheets.

3000 Tannery Way © 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 ­trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 strata-dns-security-service-ds-021120
Support: +1.866.898.9087

www.paloaltonetworks.com

You might also like