Analytics
6/23/2014
01:50 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

DNS Pioneer Founds New Security Startup

Paul Vixie launches Farsight Security, aimed at catching domain abuse early in the lifecycle.

Farsight Security today came out of stealth mode with a service that spots potentially malicious new domain names as a way to fight spam and cybercrime activity.

At the helm is DNS pioneer Paul Vixie, the principal author of the pervasive BIND DNS server software and creator of several DNS standards. This is Vixie's first commercial gig after nearly 20 years as founder, chairman, and president of the nonprofit Internet Systems Consortium.

Farsight Security's first offering, also announced today, is Newly Observed Domains (NOD), which provides real-time contextual intelligence about newly created domain names for reputation and threat feeds such as indicators of compromise, whitelists, and blacklists.

"There's no tool on the market for that," Vixie says. The goal of NOD and Farsight's strategy is to make threat intelligence more useful and actionable, according to Vixie.

Tens of thousands of domains are born daily, many of which are for spamming or cyber criminals' infrastructure. According to Farsight, 10% of spam uses domains that are less than 10 minutes old, and the bad guys are regularly registering new domain names to keep their operations up and running and out of reach by law enforcement.

"60% of spammers used domain names that are less than 24 hours old," Vixie says.

"Too many [vendors] are selling threat intelligence feeds... and they are not working," he says. "We’re trying to change the game... We sell context so people can make their own determinations and make [decisions] reliably. We have eyeballs on the ground: this is what we saw, this is what we know."

"I spent most of the 1980s and 1990s making the Internet bigger and easier to use, but unfortunately, the criminals came along for the ride," Vixie says. "We're looking at a day we can tear down criminal infrastructure as fast or faster than it's built."

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gnuian
50%
50%
gnuian,
User Rank: Ninja
6/23/2014 | 7:14:17 PM
Re: Great Thinking
@Robert McDougal

While I love the idea of Paul being an uber-lord of the Internet, I wonder how much whois information is actually available to private, non-government parties? Now, I've seen scripts that comb whois records, and for those that are private, tries matches through Google searches of like info (users with emails matching the info@ or admin@ of the domain), etc. Essentially a hack to pull as much information together with what is already out there as possible toward identifying the registrar and populating a database.  Hard to imagine a private party can get much more detailed information legally, unless Mr. Vixie is tied into PRISM... :-)
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
6/23/2014 | 6:57:53 PM
Re: Great Thinking
This is awesome!  I imagine Mr. Vixie is leveraging his contacts within the domain registrars to pull this off.  I'm not sure if an average startup company could have provided this service.  Maybe I am wrong but to be able to access that information so quickly I would assume he would need access to information only available to the domain registrars.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
6/23/2014 | 4:16:45 PM
Re: Great Thinking
What's interesting here is focusing on newly created domains and trying to stop them from getting established by the bad guys so quickly. And it's cool that DNS mavens Vixie and Mockapetris are behind this venture.
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
6/23/2014 | 3:54:34 PM
"Criminals came along for the rid"
Great quote: "I spent most of the 1980s and 1990s making the Internet bigger and easier to use, but unfortunately, the criminals came along for the ride," 
gnuian
50%
50%
gnuian,
User Rank: Ninja
6/23/2014 | 3:31:12 PM
Great Thinking
Kudos, Mr. Vixie. "We're looking at a day we can tear down criminal infrastructure as fast or faster than it's built." This is a great way of thinking and hopefully one we can propagate across organizations.  Creating a database from this activity will help law enforcement and others in the cyber security industry work more efficiently with access to historic criminal domain activity.  Of course, as soon as this gets underway, the "dark side" will respond, but I assume Farsight processes and technology are designed to be as malleable as the cyber criminals are... 
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8891
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors...

CVE-2014-8892
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via un...

CVE-2015-1170
Published: 2015-03-06
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API call...

CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.