Infoblox Unveils 2025 DNS Threat Landscape Report, Revealing Surge in AI-driven Threats and Malicious Adtech


  • Of the 100.8 million newly observed domains, 25.1 percent were classified as malicious or suspicious
  • 82 percent of environments contacted malicious adtech domains

SANTA CLARA, Calif., Aug. 04, 2025 (GLOBE NEWSWIRE) -- Infoblox, a leader in cloud networking and security services, today released its 2025 DNS Threat Landscape Report, revealing a dramatic surge in DNS-based cyberthreats and the growing sophistication of adversaries leveraging AI-enabled deepfakes, malicious adtech and evasive domain tactics.

Based on pre-attack telemetry and real-time analysis of DNS queries from thousands of customer environments—with over 70 billion DNS queries per day—the report offers a comprehensive view into how threat actors exploit DNS to deceive users, evade detection and hijack trust.

“This year’s findings highlight the many ways in which threat actors are taking advantage of DNS to operate their campaigns, both in terms of registering large volumes of domain names and also leveraging DNS misconfigurations to hijack existing domains and impersonate major brands,” said Dr. Renée Burton, head of Infoblox Threat Intel. “The report exposes the widespread use of traffic distribution systems (TDS) to help disguise these crimes, among other trends security teams must look out for to stay ahead of attackers.”

Since its inception, Infoblox Threat Intel has identified a total of over 660 unique threat actors and more than 204,000 suspicious domain clusters, meaning a group of domains believed to be registered by the same actor. Over the past 12 months, Infoblox researchers have published research covering 10 new actors. They have uncovered the breadth and depth of malicious adtech, which disguises threats from users through TDS, driving industry thought leadership in this topic.

This report brings together findings from the past 12 months to illuminate attack trends, equipping security teams with critical knowledge to keep their edge over bad actors. Particularly, the report sheds light on adtech’s role in these attacks.

Top Findings

  • Of the 100.8 million newly observed domains in the past year, 25.1 percent were classified as malicious or suspicious.
  • 95 percent of threat-related domains were observed in only one customer environment, underscoring the challenges to the security industry to detect and stop threats.
  • 82 percent of customer environments queried domains associated with malicious adtech, which rotate a massive number of domains to evade security tools and serve malicious content.
  • Nearly 500k traffic distribution system (TDS) domains were seen in the last 12 months within Infoblox networks.
  • Daily detection of DNS Tunneling, exfiltration, and command and control, including Cobalt Strike, Sliver, and custom tools, which require ML algorithms to detect.

Uptick in Newly Observed Domains

Infoblox Threat Intel identified 100.8 million newly observed domains, with over 25 percent classified as malicious or suspicious. Over the year, threat actors continuously registered, activated and deployed new domains, often in very large sets through automated registration processes. By increasing their number of domains, threat actors can bypass traditional forensic-based defenses––which are built on a “patient zero” approach to security. This reactive approach relies on detecting and analyzing threats after they have already been used somewhere else in the world. As attackers leverage increasing levels of new infrastructure, this approach becomes ineffective––leaving organizations vulnerable.

Actors are using these domains for an array of malicious purposes, from creating phishing pages to deploying malware through drive-by downloads, to engaging in fraudulent activities and scams, such as fake cryptocurrency investment sites.

The Need for Preemptive Security

These findings underscore a pressing need for organizations to be proactive in the face of AI-equipped attackers. Investing in preemptive security can be the deciding factor in successfully thwarting threat actors. Using predictive threat intelligence, Infoblox’s protective DNS solution blocked 82 percent of threat-related queries before their initial impact.

Proactive protection, paired with consistent radar on emerging threats, tips the scales in favor of security teams—allowing them to pull ahead of attackers and interrupt their unlimited supply of domains.

Access the full Infoblox DNS Threat Landscape Report 2025.

For Threat Researchers:

For Security Teams:

About Infoblox

Infoblox unites networking, security and cloud to form a platform for operations that’s as resilient as it is agile. Trusted by 13,000+ customers, including 92 of the Fortune 100, we seamlessly integrate, secure and automate critical network services so businesses can move fast without compromise. Visit infoblox.com, or follow us on LinkedIn

Media Contact:

Ariel Roop

Head of Global Communications

pr@infoblox.com 

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/bbddb35e-4751-4090-a861-7f5084c9cd84


2025 DNS Threat Landscape Report

Recommended Reading