August 25, 2022

DNS data indicates increased malicious domain activity

New research from cybersecurity vendor Akamai has revealed that 12.3% of monitored devices communicated with domains associated with malware or ransomware at least once during the second quarter of 2022. This represented a 3% increase compared to Q1 2022, the firm stated, with phishing toolkits playing a key role in malicious domain-related activity. The findings are based on DNS data and Akamai’s visibility into carrier and enterprise traffic across different industries and geographies.

Increased malware, phishing, C2 domain activity detected in Q2 2022

In a blog post detailing its research, Akamai stated that, in addition to the devices it detected communicating with domains associated with malware/ransomware, a further 6.2% of devices accessed phishing domains with 0.8% accessing command-and-control (C2)-associated domains (both small increases on Q1 2022). “While this number might seem insignificant, the scale here is in the millions of devices,” the firm wrote. “When this is considered, with C2 being the most malignant of threats, this is not only significant, it’s cardinal.”

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.

Fantastic Support

We’re extremely customer focused because we want to do right by our customers. At DNSFilter, we pride ourselves on being easy to work with. We invest heavily in creating extensive documentation for our knowledge base and backing it up with responsive email support.

Our knowledgeable and technical support staff ensures you always get the answers you need when you need them.

dnsfilter g2 award summer 2022dnsfilter g2 award summer 2022dnsfilter g2 award summer 2022dnsfilter g2 award summer 2022dnsfilter g2 award summer 2022dnsfilter g2 award summer 2022dnsfilter g2 award summer 2022dnsfilter g2 award summer 2022
dnsfilter is soc2 certified