Cyber-attacks blocked by POST’s DNS Protector
Find out about the main cyber-attacks that DNS Protector has blocked over the past months!


In the event of a cyberattack, would your business be protected?
Our DNS Protector service gives optimal internet protection for all ConnectedOffice users.
Threats
Prevents threats at DNS level before any connection to a website
Continuously checks
Continuously checks requests to access an internet resource via a browser
Securely redirects
Securely redirects the user’s browser to a protection page
Definitions
The term “malware” (a portmanteau of malicious and software) refers to any program on a computer or mobile device that contains malicious code. Malware is installed without the users’ knowledge and generates a variety of undesirable and nasty effects.
Phishing is a pirating technique based on identity theft. It involves an email asking you to visit a banking or commercial website. The technique consists of making victims believe that they are contacting a trusted third party – bank, government, etc. – in order to extract personal information from them: password, credit card number, date of birth, etc. The link or attachment shown actually leads to a fake site.
Using the Command and Control callback, the attacker starts by infecting a computer using a phishing email, by exploiting gaps in the security of browser plugins, or via other infected software. Once communication is established, the infected device sends a signal to the attacker’s server, awaiting further instruction. It will then execute commands from the attacker’s C2 server, and may also install additional software. The attacker now has full control of the victim’s device and can execute any code they want. The malicious code usually spreads to more devices, creating a botnet – a network of infected devices.