Research within the public domain shows that state-sponsored malware and APT campaigns exhibit DNS indicators of compromise (IOC). Since June 2010, analysis of cyberweapon platforms and agents has been undertaken by labs including Kaspersky Lab, ESET, Symantec, McAfee, Norman Safeground, and Mandiant. The findings as released by these organizations include detailed analysis of Stuxnet,1 Flame,2 Hidden Lynx,3 Operation Troy,4 The NetTraveler,5 Operation Hangover,6 Mandiant APT1,7 and Careto.8 These malware and APT campaigns can be reliably identified within computer networks through the use of DNS analytics tools.
"Stuxnet Under the Microscope" (PDF). ESET. Archived from the original (PDF) on 2011-07-10. Retrieved 2014-02-25. https://web.archive.org/web/20110710201455/http://www.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf ↩
"The Roof is on Fire - Tracking Flames C&C Servers". Kaspersky Lab. 22 August 2023. https://www.securelist.com/en/blog/208193540/The_Roof_Is_on_Fire_Tackling_Flames_C_C_Servers ↩
"Hidden Lynx" (PDF). Symantec. Archived from the original (PDF) on 2014-08-09. Retrieved 2014-02-25. https://web.archive.org/web/20140809015929/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf ↩
"Dissecting Operation Troy" (PDF). McAfee. http://www.mcafee.com/sg/resources/white-papers/wp-dissecting-operation-troy.pdf ↩
"The Nettraveler, Part 1" (PDF). Kaspersky Lab. Archived from the original (PDF) on 2013-09-27. Retrieved 2014-02-25. https://web.archive.org/web/20130927014114/http://www.securelist.com/en/downloads/vlpdfs/kaspersky-the-net-traveler-part1-final.pdf ↩
"Unveiling an Indian Cyberattack Infrastructure" (PDF). Norman Safeground. Archived from the original (PDF) on 2014-03-17. Retrieved 2014-02-25. https://web.archive.org/web/20140317015447/http://normanshark.com/wp-content/uploads/2013/08/NS-Unveiling-an-Indian-Cyberattack-Infrastructure_FINAL_Web.pdf ↩
"Mandiant APT1 Report" (PDF). Mandiant. Archived from the original (PDF) on 2013-02-19. Retrieved 2014-02-25. https://web.archive.org/web/20130219155150/http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf ↩
"Unveiling the Mask" (PDF). Kaspersky Lab. Archived from the original (PDF) on 2014-02-25. Retrieved 2014-02-25. https://web.archive.org/web/20140225072140/http://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf ↩