Advanced Threat Prevention now supports DNS relay attack detection, a data
exfiltration method that exploits legitimate web services by embedding malicious domains in
HTTP headers.
Attackers can exploit a vast number of legitimate websites, making traditional domain
blocking less effective. By implementing this protection, you can enhance your
security posture and prevent covert data exfiltration techniques that might
otherwise go undetected.
The DNS relaying detection works by analyzing HTTP, HTTP2, and SSL traffic for
suspicious patterns in headers and Server Name Indication (SNI) fields. When
enabled, web requests containing hostnames in web headers are analyzed, identifying
potential data exfiltration attempts. This capability leverages the existing
Advanced Threat Prevention infrastructure to detect and prevent attackers from
exploiting legitimate web services for DNS tunneling.
The DNS relaying attack prevention integrates with your existing Advanced Threat
Prevention configuration in the anti-spyware security profile, where you can set
actions for detected threats and define exclusions. The system generates detailed
logs and reports, providing you with comprehensive visibility into detected attacks
and enabling effective incident response.