Cyber-attacks blocked by POST’s DNS Protector

Find out about the main cyber-attacks that DNS Protector has blocked over the past months!

In the event of a cyberattack, would your business be protected?

Our DNS Protector service gives optimal internet protection for all ConnectedOffice users.

Threats

Prevents threats at DNS level before any connection to a website

Continuously checks

Continuously checks requests to access an internet resource via a browser

Securely redirects

Securely redirects the user’s browser to a protection page

Definitions

The term “malware” (a portmanteau of malicious and software) refers to any program on a computer or mobile device that contains malicious code. Malware is installed without the users’ knowledge and generates a variety of undesirable and nasty effects.

Phishing is a pirating technique based on identity theft. It involves an email asking you to visit a banking or commercial website. The technique consists of making victims believe that they are contacting a trusted third party – bank, government, etc. – in order to extract personal information from them: password, credit card number, date of birth, etc. The link or attachment shown actually leads to a fake site.

Using the Command and Control callback, the attacker starts by infecting a computer using a phishing email, by exploiting gaps in the security of browser plugins, or via other infected software. Once communication is established, the infected device sends a signal to the attacker’s server, awaiting further instruction. It will then execute commands from the attacker’s C2 server, and may also install additional software. The attacker now has full control of the victim’s device and can execute any code they want. The malicious code usually spreads to more devices, creating a botnet – a network of infected devices.