{"id":125182,"date":"2025-11-20T12:21:51","date_gmt":"2025-11-20T04:21:51","guid":{"rendered":"https:\/\/version-2.com\/?p=125182"},"modified":"2025-11-20T12:25:02","modified_gmt":"2025-11-20T04:25:02","slug":"mapping-dns-layer-threats-to-the-mitre-attck-framework","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/11\/mapping-dns-layer-threats-to-the-mitre-attck-framework\/","title":{"rendered":"Mapping DNS-Layer Threats to the MITRE ATT&#038;CK Framework"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"125182\" class=\"elementor elementor-125182\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-125616\" src=\"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/11\/Mapping-DNS-Layer-Threats.png\" alt=\"\" width=\"1920\" height=\"1080\" \/><\/p><p class=\"text-lg leading-relaxed text-gray-700 mb-6\">Following our previous series on DNS security, this guide steps deeper into one of the quieter but more consequential axes attackers use: the DNS layer as a persistent communications and data channel. For SOC analysts, CISOs, and threat intelligence teams, DNS is rarely just &#8220;name resolution.&#8221; When adversaries use DNS for Domain Generation Algorithms (<span class=\"key-concept\">DGAs<\/span>), tunneling, or command-and-control (<span class=\"key-concept\">C2<\/span>), they exploit the protocol\u2019s ubiquity and gaps in visibility stacks.<\/p><p class=\"text-gray-700 mb-6\">MITRE released major updates with ATT&amp;CK v17 (April 2025) and v18 (October 2025), introducing refined detection strategies, enhanced analytics, and expanded coverage of stealthy persistence tactics. This article spotlights these emerging concepts, particularly where we can deliver actionable mitigations and visibility gains.<\/p><h2 class=\"text-2xl\">MITRE ATT&amp;CK, DNS-layer Threats, and DET0400<\/h2><p class=\"text-gray-700 mb-4\">MITRE ATT&amp;CK is the lens SOCs use to translate telemetry into a common story: what adversaries tried to do. This framing converts &#8220;we saw DNS noise&#8221; into &#8220;we saw T1071.004-style behavior likely supporting C2.&#8221; The taxonomy has matured from &#8220;what adversaries do&#8221; into &#8220;how to reliably detect what they do.&#8221;<\/p><div class=\"mitre-point\"><h3 class=\"font-bold text-lg mb-2\">Focus on DET0400: Behavioral Detection<\/h3><p class=\"text-gray-700\">The evolution is directly visible in the new DET0400 detection strategy: Behavioral Detection of DNS Tunneling and Application Layer Abuse (Technique: DNS | <span class=\"key-concept\">T1071.004<\/span>). DET0400 packages the detection problem behaviorally: look for DNS-specific patterns (high entropy labels, anomalous query frequency\/timing, encoding) and map those behaviors to concrete analytics across Windows, Linux, macOS, and network devices.<\/p><\/div><h2 class=\"text-2xl\">Mapping DNS Adversary Behaviors to ATT&amp;CK<\/h2><div class=\"content-block\"><h3 class=\"font-bold\">Domain Generation Algorithms (DGAs)<\/h3><p class=\"feature-detail mt-1\">DGAs produce pseudo-random domains that look statistically abnormal. They map to <span class=\"key-concept\">Reconnaissance<\/span> tradecraft and are often an earlier link in a C2 chain. Detection requires temporal aggregation and enrichment with passive DNS and threat-intel feeds.<\/p><h3 class=\"font-bold mt-4\">DNS Tunneling \/ C2 over DNS (T1071.004)<\/h3><p class=\"feature-detail mt-1\">Here, the payload rides in the query or response (e.g., TXT records, Base32\/Base64-encoded blobs). Behavior includes small, frequent queries with unusual label lengths, or low-volume but high-entropy replies. DET0400 targets this by flagging anomalous query shapes and timing beacons.<\/p><h3 class=\"font-bold mt-4\">Data Exfiltration via DNS<\/h3><p class=\"feature-detail mt-1\">This involves slicing data into small, encoded parts and ferrying it out via irregular TXT\/NULL responses or steadily increasing query rates. These actions intersect with both <span class=\"key-concept\">C2<\/span> and <span class=\"key-concept\">Exfiltration<\/span> tactics. Detection emphasizes chaining DNS anomalies to host process context to reduce false positives.<\/p><\/div><h2 class=\"text-2xl\">Disrupting the Kill Chain: Where DNS Defenses Hit Hardest<\/h2><p class=\"text-gray-700 mb-4\">Proper DNS-layer telemetry and DET0400-style analytics let you disrupt adversaries across three critical phases:<\/p><ul class=\"list-disc ml-8 text-gray-700 space-y-2 mb-6\"><li><span class=\"key-concept\">Reconnaissance \/ Initial Rendezvous:<\/span> DGAs and reconnaissance queries leave early fingerprints (surges in unknown names, suspicious WHOIS patterns). Blocking or flagging these reduces an adversary\u2019s ability to bootstrap C2.<\/li><li><span class=\"key-concept\">Command &amp; Control (C2):<\/span> DNS tunneling and beaconing are persistent lifelines for remote control. Behavioral detection of T1071.004-style activity can sever that lifeline.<\/li><li><span class=\"key-concept\">Exfiltration:<\/span> Small, encoded streams over DNS are detectable when you correlate content entropy, record types, and host process context; catching this early prevents data loss.<\/li><\/ul><h2 class=\"text-2xl\">DNS Tactics Mapped to ATT&amp;CK Matrix<\/h2><div class=\"tactic-section\"><h3 class=\"font-bold text-lg mb-2 text-blue-800\">TA0043 \u2013 Reconnaissance<\/h3><p class=\"text-gray-700\">Reconnaissance involves an operator learning your network edges (which hostnames exist, resolver behavior, etc.). Detection relies on passive DNS history to spot &#8220;first-seen&#8221; timestamps, clusters of never-before-seen subdomains, and statistical anomalies (DGAs) that test the edges of your allowlist. SafeDNS aids by exposing &#8220;newly observed&#8221; signals and pDNS history for early DGA detection.<\/p><\/div><div class=\"tactic-section\"><h3 class=\"font-bold text-lg mb-2 text-blue-800\">TA0011 \u2013 Command &amp; Control (T1071.004)<\/h3><p class=\"text-gray-700\">This is the home base for DNS tunneling. The wire takes on a metronome quality: machine patience, coded labels, and answers that carry just enough data to keep the conversation going. Detection requires behavioral modeling of inter-arrival timing, label-length distributions, and entropy fingerprints\u2014not just static domain blacklists. SafeDNS applies behavioral analytics to identify C2 traffic by shape and correlates it with host process context.<\/p><\/div><div class=\"tactic-section\"><h3 class=\"font-bold text-lg mb-2 text-blue-800\">TA0010 \u2013 Exfiltration<\/h3><p class=\"text-gray-700\">Exfiltration over DNS is patient, slicing data into encoded labels. Volume alerts miss it. Detection must track label length and variance over time, focusing on irregular TXT\/NULL records used as a return path. Tying these streams back to host process context (e.g., a suspicious child process reading an archive) turns a &#8220;maybe&#8221; into a high-fidelity alert. SafeDNS monitors record types, label lengths, and query cadence per host to distinguish smuggling from legitimate traffic.<\/p><\/div><div class=\"tactic-section\"><h3 class=\"font-bold text-lg mb-2 text-blue-800\">TA0005 \u2013 Defense Evasion<\/h3><p class=\"text-gray-700\">Evasion is pressure applied to your visibility model: moving DNS into DoH\/DoT to starve inspection, using timing jitter to defeat cadence rules, or simply using a custom resolver to bypass policy. The architectural counter is to be explicit about encrypted resolvers and treat traffic shape as a first-class signal. SafeDNS enforces strict resolver policies and applies behavioral analytics that look for non-human DNS patterns, even when content is opaque.<\/p><\/div><div class=\"tactic-section\"><h3 class=\"font-bold text-lg mb-2 text-blue-800\">TA0042 \u2013 Resource Development &amp; TA0001 \u2013 Initial Access<\/h3><p class=\"text-gray-700\">These often leave early fingerprints: fast-rotating domains, newly observed zones that bloom and die within a week, brand-spoof models (combosquats). Watching these patterns allows preemption before the payload lands. SafeDNS brings pDNS history and infrastructure context into filtering policies, exposing &#8220;newly observed&#8221; and &#8220;suspicious lifecycle&#8221; signals to the intelligence pipeline.<\/p><\/div><h2 class=\"text-2xl\">Closing Perspective: From Noise to Primary Detection Surface<\/h2><p class=\"text-lg leading-relaxed text-gray-700 mt-6 font-semibold\">MITRE\u2019s evolution with DET0400 validates a crucial lesson: the fight is won where telemetry is rich and close to the adversary\u2019s lifeline. DNS is no longer a hygiene checkbox\u2014it\u2019s a primary detection surface.<\/p><p class=\"text-gray-700 mb-4\">The mandate is operational: a modern SOC that claims ATT&amp;CK coverage without first-class DNS telemetry is arguing with the framework&#8217;s direction. Conversely, a SOC that aligns detections to T1071.004 via DET0400 is moving with the current.<\/p><div class=\"mitre-point bg-green-50\"><h3 class=\"font-bold text-lg mb-2 text-green-700\">Where SafeDNS Fits:<\/h3><p class=\"text-gray-700\">By correlating DNS telemetry to MITRE ATT&amp;CK, SafeDNS helps SOCs make protection coverage visible across Reconnaissance \u2192 C2 \u2192 Exfiltration. This includes pDNS-backed history for early DGA signals, behavioral analytics that flag C2 conversations by shape, and alerts enriched with process context for decisive, auditable response.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"46348\" class=\"elementor elementor-46348\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About SafeDNS<\/strong><br \/>SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI &amp; ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users&#8217; online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Following our previous series on DNS security, this gui [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[738,1305,61],"tags":[739,1077],"class_list":["post-125182","post","type-post","status-publish","format-standard","hentry","category-safedns","category-1305","category-press-release","tag-safedns","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mapping DNS-Layer Threats to the MITRE ATT&amp;CK Framework - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mapping DNS-Layer Threats to the MITRE ATT&amp;CK Framework - Version 2\" \/>\n<meta property=\"og:description\" content=\"Following our previous series on DNS security, this gui [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-20T04:21:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T04:25:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/11\/Mapping-DNS-Layer-Threats.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/11\\\/mapping-dns-layer-threats-to-the-mitre-attck-framework\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Mapping DNS-Layer Threats to the MITRE ATT&#038;CK Framework\",\"datePublished\":\"2025-11-20T04:21:51+00:00\",\"dateModified\":\"2025-11-20T04:25:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/11\\\/mapping-dns-layer-threats-to-the-mitre-attck-framework\\\/\"},\"wordCount\":964,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Mapping-DNS-Layer-Threats.png\",\"keywords\":[\"safedns\",\"2025\"],\"articleSection\":[\"SafeDNS\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/11\\\/mapping-dns-layer-threats-to-the-mitre-attck-framework\\\/\",\"url\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/\",\"name\":\"Mapping DNS-Layer Threats to the MITRE ATT&CK Framework - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Mapping-DNS-Layer-Threats.png\",\"datePublished\":\"2025-11-20T04:21:51+00:00\",\"dateModified\":\"2025-11-20T04:25:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Mapping-DNS-Layer-Threats.png\",\"contentUrl\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Mapping-DNS-Layer-Threats.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.safedns.com\\\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mapping DNS-Layer Threats to the MITRE ATT&#038;CK Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mapping DNS-Layer Threats to the MITRE ATT&CK Framework - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/","og_locale":"zh_HK","og_type":"article","og_title":"Mapping DNS-Layer Threats to the MITRE ATT&CK Framework - Version 2","og_description":"Following our previous series on DNS security, this gui [&hellip;]","og_url":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/","og_site_name":"Version 2","article_published_time":"2025-11-20T04:21:51+00:00","article_modified_time":"2025-11-20T04:25:02+00:00","og_image":[{"url":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/11\/Mapping-DNS-Layer-Threats.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/11\/mapping-dns-layer-threats-to-the-mitre-attck-framework\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Mapping DNS-Layer Threats to the MITRE ATT&#038;CK Framework","datePublished":"2025-11-20T04:21:51+00:00","dateModified":"2025-11-20T04:25:02+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/11\/mapping-dns-layer-threats-to-the-mitre-attck-framework\/"},"wordCount":964,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/11\/Mapping-DNS-Layer-Threats.png","keywords":["safedns","2025"],"articleSection":["SafeDNS","2025","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/11\/mapping-dns-layer-threats-to-the-mitre-attck-framework\/","url":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/","name":"Mapping DNS-Layer Threats to the MITRE ATT&CK Framework - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/#primaryimage"},"image":{"@id":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/11\/Mapping-DNS-Layer-Threats.png","datePublished":"2025-11-20T04:21:51+00:00","dateModified":"2025-11-20T04:25:02+00:00","breadcrumb":{"@id":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/#primaryimage","url":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/11\/Mapping-DNS-Layer-Threats.png","contentUrl":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/11\/Mapping-DNS-Layer-Threats.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.safedns.com\/mapping-dns-layer-threats-to-the-mitre-att-ck-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Mapping DNS-Layer Threats to the MITRE ATT&#038;CK Framework"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-wz4","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/125182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=125182"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/125182\/revisions"}],"predecessor-version":[{"id":125189,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/125182\/revisions\/125189"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=125182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=125182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=125182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}