<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Seeing DNS Tunnel traffic to/from our Public Ranges? in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1247748#M2494</link>
    <description>&lt;P&gt;Any insights from Palo Alto?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Feb 2026 17:53:11 GMT</pubDate>
    <dc:creator>B.Kowalkowski</dc:creator>
    <dc:date>2026-02-09T17:53:11Z</dc:date>
    <item>
      <title>Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225728#M2420</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;This past week I've started seeing traffic that's classified as Tunneling:isavscan.[tld] (threat type: dns-c2, ThreatID: 109001001) hitting our Outside intrazone rule where the source and destination are our public ARIN IPs (the rule is currently set to allow while I make sure I have all the traffic we need like BGP and IPSec allowed in other rules). Even more strange, the traffic always seems to be going to the next adjacent IP (so from 1.1.1.1 -&amp;gt; 1.1.1.2, or 1.1.1.200 -&amp;gt; 1.1.1.199), and it's even involving IPs that we don't currently have NATed to anything.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My only guess is some kind of reflection attack, but it's been really low volume, 84 sessions since 3/31.&amp;nbsp;Has anyone seen something like this before? Any thoughts on what attack strategy could be at play, or if there's anything I should do?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's a sample of the threat logs:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="public to public DNS tunnel.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66971iCB25F674F9914ADA/image-size/large?v=v2&amp;amp;px=999" role="button" title="public to public DNS tunnel.PNG" alt="public to public DNS tunnel.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2025 16:38:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225728#M2420</guid>
      <dc:creator>JoshVogel0</dc:creator>
      <dc:date>2025-04-07T16:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225967#M2422</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;If you are not hosing any services that need an inbound NAT, I would recommend you block/drop all external traffic. I always have a DENY ALL policy as my last policy that blocks any any any traffic. This would also block the traffic you are seeing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 19:24:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225967#M2422</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-04-08T19:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225970#M2425</link>
      <description>&lt;P&gt;Thanks, but we do host many externally available services. I am working on blocking all unspecified Outside-Untrust to Outside-Untrust traffic which, as you say, will block this traffic too, but am making sure I do so without affecting BGP/IPSec/VPN in the process. I was more curious what this strange traffic could indicate. C2 would imply we have compromised hosts, but if that was the case the source IP would be one of our internal IPs, not external. It also doesn't account for why some of our unused external IPs were also taking part.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 19:33:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225970#M2425</guid>
      <dc:creator>JoshVogel0</dc:creator>
      <dc:date>2025-04-08T19:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225972#M2426</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;First put into place policies that allow the traffic you want to see,&amp;nbsp;&lt;SPAN&gt;BGP/IPSec/VPN&amp;nbsp;(source and destination). Then once you see those policies start to be hit for the traffic you want, then put in the blocking policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the traffic was sourced from external and is destination is external, then I doubt its an internal C2 since the traffic would then be sourced from inside. Looks like a scan from the threat info.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2025 19:39:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1225972#M2426</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-04-08T19:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1241530#M2484</link>
      <description>&lt;P&gt;I've seen similar traffic to/from adjacent IPs in our range, always source port 12345, destination port 53.&lt;BR /&gt;&lt;BR /&gt;Have to assume it is reflection replies of some sort, we have anti-spoofing on the outside so the traffic is not spoofed source from the Internet, and checked the logs from the source IPs and they didn't source the traffic either... would be interesting to know more, but I have no answers.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 12:14:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1241530#M2484</guid>
      <dc:creator>gcoochey</dc:creator>
      <dc:date>2025-11-10T12:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1242891#M2490</link>
      <description>&lt;P&gt;We are seeing the same behaviour in our VPN site to site tunnel, same Threat ID, labelled as spyware.&amp;nbsp; Further details as to why this is happening would be appreciated&lt;/P&gt;</description>
      <pubDate>Mon, 01 Dec 2025 17:18:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1242891#M2490</guid>
      <dc:creator>I.Warn</dc:creator>
      <dc:date>2025-12-01T17:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1247748#M2494</link>
      <description>&lt;P&gt;Any insights from Palo Alto?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 17:53:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1247748#M2494</guid>
      <dc:creator>B.Kowalkowski</dc:creator>
      <dc:date>2026-02-09T17:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: Seeing DNS Tunnel traffic to/from our Public Ranges?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1248528#M2495</link>
      <description>&lt;P&gt;We've been seeing traffic like this hit our firewall.&amp;nbsp;I have a theory -- this is an actor that's probing around for internal recursive DNS resolvers. And I want to be specific about "internal" -- they're not looking for open resolvers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's say I'm an attacker and I want to footprint an organization.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;I can setup an authoritative domain I own -- let's say example.com, and I host it on a DNS server I manage.&lt;/LI&gt;
&lt;LI&gt;I start sending out spoofed DNS queries to an address range I want to inspect. Let's say I want to see if 192.0.2.80 is a DNS server, I spoof from 192.0.2.79, and I might query for a name like test-192-0-2-80.example.com. The record doesn't have to be this obvious, but it's probably unique to the probe target.&lt;/LI&gt;
&lt;LI&gt;Because the spoofed source and target addresses are near to each other, it's likely that a recursive DNS server would permit that source address to perform a query. If you have a DNS server at 192.0.2.80, it's probably going to allow 192.0.2.0/24.&lt;/LI&gt;
&lt;LI&gt;As an attacker, I actually don't care about the response and I'd never see it. What I'm interested in doing is causing the DNS server to take some action I CAN observe. Specifically I'm interested in whether I see a query for test-192-0-2-80.example.com on my authoritative server.&lt;/LI&gt;
&lt;LI&gt;If I do see this, then I know that 192.0.2.80 is indeed a recursive resolver.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;What would be neat is if someone has managed to get a payload pcap to see what the DNS query looks like.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for what they're looking to do with this information? No clue, we haven't seen any follow-on traffic after the probes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Update] A coworker did some research and found a &lt;A href="https://blog.apnic.net/2024/04/19/destination-adjacent-source-address-spoofing/" target="_blank" rel="noopener"&gt;2024 APNIC describing this as DASA Spoofing&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 15:23:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/seeing-dns-tunnel-traffic-to-from-our-public-ranges/m-p/1248528#M2495</guid>
      <dc:creator>jharr</dc:creator>
      <dc:date>2026-02-19T15:23:46Z</dc:date>
    </item>
  </channel>
</rss>

