Infoblox Threat Intel was recognized as a contributor in the Verizon 2025 Data Breach Investigation Report (DBIR), emphasizing the risks associated with malicious adtech in cybersecurity.
The Verizon 2025 DBIR highlighted how adversaries have expanded their operations, concentrating on traffic distribution systems (TDS) and malicious adtech to conceal and advance their activities.
Ransomware attacks have seen a 37% surge, targeting small organizations more frequently than larger enterprises, with human vulnerabilities such as phishing and credential abuse being major initial access vectors.
Infostealers have become a significant threat, with 54% of ransomware victims identified having their domains in infostealer logs, linking infostealers to ransomware incidents.
The report also highlighted the vulnerability of bring-your-own-device (BYOD) programs, where unprotected devices are targeted to collect credentials, and new social engineering tactics like 'prompt bombing' have emerged.
Malicious adtech is identified as a crucial enabler for threat actors, facilitating the delivery of malware and phishing tools while remaining undetected, emphasizing the need for protective DNS solutions.
Threat actors exploit adtech, including Traffic Distribution Systems (TDSs), to hide their operations and launch attacks, with Infoblox uncovering actors like Vane Viper and Vacant Viper using malicious adtech for their activities.
By leveraging protective DNS solutions, organizations and individuals can mitigate the risks posed by malicious adtech, blocking a significant percentage of threats even before the first DNS query is made, as demonstrated by Infoblox.
Education on malicious adtech threats can be obtained through events like the 2025 RSA Conference learning lab and visiting Infoblox's Threat Intel website for further insights and protection measures.