- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
By: @aechano
Co-Author: @tbolatiwa
Imagine a trusted employee clicks a legitimate-looking link. In a fraction of a second, an invisible chain of redirects begins. A stealthy, automated system analyzes their device, identifies them as a perfect target, and directs them to a sophisticated, custom-crafted phishing site or a tech-support scam. This isn't random chance; it's a precisely engineered attack powered by a Malicious Traffic Distribution System (TDS).
Recent campaigns, such as Parrot TDS, have compromised tens of thousands of websites, weaponizing TDS to deliver malware, phishing pages, and dangerous scams. These threats don't rely on known malware signatures; they hide their intent in the most overlooked part of the network—DNS traffic.
The Traffic Distribution System (TDS) is a sophisticated, backend platform that cybercriminals utilize. It’s designed to evaluate a victim based on factors like their geography, operating system, and browser, then route them to the most profitable malicious landing page.
Figure 1: Stages of a Malicious TDS Attack
Traditional security often fails against malicious TDS for two reasons:
The answer to this evasive threat is to introduce a layer of predictive, machine learning-driven security at the DNS layer. Palo Alto Networks Advanced DNS Security utilizes cloud-based AI and deep threat intelligence to identify structural and behavioral anomalies in a TDS network, neutralizing the attack before the redirection chain can be completed.
Advanced DNS Security, powered by Precision AI, works by looking beyond individual domain names to identify the malicious infrastructure itself.
Advanced DNS Security, powered by Precision AI, works by looking beyond individual domain names to identify the malicious infrastructure itself. This includes detecting a broader spectrum of evasive DNS-layer threats, such as domain hijacking, masquerading, domain shadowing, DNS tunneling, and fast-flux infrastructure that attackers use to discreetly redirect victims, hide command and control activity, and bypass traditional security tools.
First things first, ensure that the Advanced DNS Security license is active and the device is running PAN-OS 11.2 or later. While this detection is available for the regular DNS Security license, using the latest PAN-OS release ensures access to the most up-to-date DNS protection capabilities and security enhancements. Once these prerequisites are in place, set the malware category to “sinkhole” to protect your environment against malicious Traffic Distribution System (TDS) techniques and other advanced DNS-layer threats.
If Advanced DNS Security is not yet enabled, activating this critical protection is straightforward, whether you're managing your environment through Strata Cloud Manager (SCM) or Panorama.
Activate Strata Cloud Manager (SCM) :
Figure 2: DNS and Advanced DNS Security Category Settings Overview
Activate on Panorama:
Figure 3: DNS Security Policy Configuration for Malicious and High-Risk Domains
Once Advanced DNS Security is enabled, your organization gains advanced protection against highly evasive threats, such as malicious TDS, that conventional security methods often miss.
Figure 4: Threat Log View for Malicious TDS Detection
When a threat is detected, the Threat Log provides a comprehensive view of the threat. The log details provide in-depth context, including the threat ID, name, and corresponding mapping in the Threat Vault. This empowers your security team with the actionable intelligence they need to quickly respond to the most sophisticated network threats.
To truly safeguard your organization from the most advanced and evasive redirection threats, enabling Advanced DNS Security on your Palo Alto Networks Next-Generation Firewall, SASE, or Advanced DNS Security Resolver (ADNSR) solution is not just recommended; it's essential. Take the next step to unmask the invisible and strengthen your security posture today.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
| Subject | Likes |
|---|---|
| 1 Like | |
| 1 Like | |
| 1 Like | |
| 1 Like | |
| 1 Like |


