• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Suspicious Top-level Domain

Risk Factors

Attackers might evade detection by cycling through numerous domain names for their malicious command-and-control (C&C) server. Instead of choosing a standard top-level domain (TLD) for their malicious server, attackers might choose non-standard TLDs. These TLDs are often free and can offer more anonymity than standard TLDs, such as .com, which are registered to owner accounts. Frequent visits to suspicious, non-standard TLDs can indicate malware on a device or malicious activity on the network.

Kill Chain

Caution

Risk Score

61

Detection diagram
Next in Caution: Suspicious User Agent

Attack Background

N/A

Mitigation Options

Configure all workstations to send queries to approved DNS servers that filter or block suspicious domains

Block inbound and outbound traffic from non-approved DNS servers or suspicious non-standard TLDs at the network perimeter

What else can RevealX do for you?