This is the third in a three-part, in-depth report covering nearly a year of research into VexTrio. To learn more about the people and entities involved, see the first part here. To learn about VexTrio’s activities, see here. VexTrio domains and references from this research can be found in our GitHub repository. In the first […] The post Inside the Robot: Deconstructing VexTrio’s Affiliate Advertising Platform appeared first on Infoblox Blog.| Infoblox Blog
This is the second in a three-part, in-depth report covering nearly a year of research into VexTrio. To learn more about the people and entities involved, see the first part here. To learn about VexTrio’s infrastructure and technology stack, see here. VexTrio domains and references from this research can be found in our GitHub repository. […] The post VexTrio Unmasked: A Legacy of Spam and Homegrown Scams appeared first on Infoblox Blog.| Infoblox Blog
“Everyone knows that eliminating spam is impossible to achieve, until an ignorant person who doesn’t know this comes along and starts sending some (Italian) spammer to jail. <beg>” —Lex Tutor, 2011 This quote is powerful when you realize that it is referring to progenitors of the notorious VexTrio traffic distribution system (TDS). “Lex Tutor” was […] The post VexTrio’s Origin Story: From Spam to Scam to Adtech appeared first on Infoblox Blog.| Infoblox Blog
The Verizon 2025 DBIR provides multiple insights on how adversaries have increased the scale of their operations and succeeded in finding new targets. According to Dr. Renée Burton, head of Infoblox Threat Intel, many of the Verizon findings highlight the under-recognized threat of traffic distribution systems (TDS) and malicious adtech.| Infoblox Blog
The adverse impact of visiting compromised domains that integrate malicious adtech.| Infoblox Blog
Russian threat actors combine domain name vulnerabilities with hidden router proxy techniques to scale their attacks while remaining shielded from detection.| Infoblox Blog
Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.| Infoblox Blog
Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs used by threat actors like Revolver Rabbit to deliver XLoader, Hancitor, and other malware| Infoblox Blog