<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DNS Security &amp; Threat Intelligence Blog | Shreshta</title>
	<atom:link href="https://shreshtait.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://shreshtait.com/blog/</link>
	<description>DNS Security &#38; Threat Intelligence</description>
	<lastBuildDate>Tue, 30 Sep 2025 15:44:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>SBI Crypto Investment Campaign</title>
		<link>https://shreshtait.com/blog/2025/09/sbi-crypto-investment-campaign/</link>
		
		<dc:creator><![CDATA[Shreshta Threat Research]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 11:51:11 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[japan]]></category>
		<category><![CDATA[SBI crypto investment]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7683</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2025/09/Subheading-150x150.webp" class="attachment-thumbnail size-thumbnail wp-post-image" alt="SBI Crypto Investment Campaign" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2025/09/Subheading-150x150.webp 150w, https://shreshtait.com/blog/wp-content/uploads/2025/09/Subheading-70x70.webp 70w" sizes="(max-width: 150px) 100vw, 150px" />Shreshta Threat Research has uncovered a SBI crypto investment campaign targeting cryptocurrency users across Japan, Vietnam, South Korea, China, Thailand, and the United Kingdom. Executive Summary SBI Investment Co., Ltd is the core company in the SBI Group&#8217;s Investment Business. It is one of the leading venture capital firm in Japan. Initial domain level indicators [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2025/09/sbi-crypto-investment-campaign/">SBI Crypto Investment Campaign</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Crypto &#038; Investment scams exploiting the Tesla brand</title>
		<link>https://shreshtait.com/blog/2025/05/crypto-investment-scams-exploiting-the-tesla-brand/</link>
		
		<dc:creator><![CDATA[Shreshta Threat Research]]></dc:creator>
		<pubDate>Tue, 27 May 2025 09:58:27 +0000</pubDate>
				<category><![CDATA[Scam]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[elon musk]]></category>
		<category><![CDATA[investment]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[spacex]]></category>
		<category><![CDATA[tesla]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7659</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2025/05/Screenshot-2025-05-26-at-4.46.24 PM-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Crypto &amp; Investment scams exploiting the Tesla Brand" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2025/05/Screenshot-2025-05-26-at-4.46.24 PM-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2025/05/Screenshot-2025-05-26-at-4.46.24 PM-70x70.png 70w" sizes="(max-width: 150px) 100vw, 150px" />Shreshta Threat Research has detected crypto &#38; investment scams exploiting the Tesla brand. Executive Summary In recent months, there has been a significant surge in crypto and investment scams exploiting the Tesla brand, particularly targeting cryptocurrency enthusiasts and investors. Scammers are capitalizing on Tesla’s global reputation, its high media visibility, and CEO Elon Musk’s vocal [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2025/05/crypto-investment-scams-exploiting-the-tesla-brand/">Crypto &amp; Investment scams exploiting the Tesla brand</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Digital Arrest Scam &#8211; How scammers use fake documents &#038; exploit legal fears</title>
		<link>https://shreshtait.com/blog/2024/10/digital-arrest-scam-how-scammers-use-fake-documents-exploit-legal-fears/</link>
		
		<dc:creator><![CDATA[Shreshta Threat Research]]></dc:creator>
		<pubDate>Tue, 15 Oct 2024 08:09:36 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[CBI]]></category>
		<category><![CDATA[Customs]]></category>
		<category><![CDATA[digital arrest]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[RBI]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[TRAI]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7498</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/10/handcuffs-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of handcuffs with a digital element of zeroes and ones" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/10/handcuffs-150x150.jpeg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/10/handcuffs-300x300.jpeg 300w, https://shreshtait.com/blog/wp-content/uploads/2024/10/handcuffs-768x768.jpeg 768w, https://shreshtait.com/blog/wp-content/uploads/2024/10/handcuffs-70x70.jpeg 70w, https://shreshtait.com/blog/wp-content/uploads/2024/10/handcuffs.jpeg 1024w" sizes="(max-width: 150px) 100vw, 150px" />One of the latest cyber crime campaigns doing the rounds in India is the Digital Arrest Scam. The scammers use fake arrest warrant documents and threats to intimidate people into revealing personal information or paying money. The objective of the scammer is to scare and instill fear in the mind of the victim and act [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/10/digital-arrest-scam-how-scammers-use-fake-documents-exploit-legal-fears/">Digital Arrest Scam &#8211; How scammers use fake documents &amp; exploit legal fears</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Zerodha users targeted with a pig-butchering scam</title>
		<link>https://shreshtait.com/blog/2024/09/zerodha-users-targeted-with-a-pig-butchering-scam/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar&nbsp;and&nbsp;Swapneel Patnekar]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 08:04:56 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[pig-buchering]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[zerodha]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7279</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-150x150.webp" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of a shattered piggy bank depicting a pig-butchering scam" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-150x150.webp 150w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-300x300.webp 300w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-768x768.webp 768w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572-70x70.webp 70w, https://shreshtait.com/blog/wp-content/uploads/2024/09/722e607b34d0e227b1fb223de7bc3572.webp 1024w" sizes="auto, (max-width: 150px) 100vw, 150px" />Threat researchers at Shreshta have uncovered a pig-butchering scam targeting Zerodha users. The phishing websites are impersonating Zerodha, a reputed stockbroking and financial services company, duping investors into investing in fake crypto and investment schemes. What is a pig-butchering scam? A pig butchering scam, a.k.a. &#8220;Sha Zhu Pan&#8221; or Shazhupan, (Chinese: 杀猪盘), translated as Killing [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/09/zerodha-users-targeted-with-a-pig-butchering-scam/">Zerodha users targeted with a pig-butchering scam</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Whois API free</title>
		<link>https://shreshtait.com/blog/2024/08/whois-api-free/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Mon, 26 Aug 2024 17:15:48 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[whois]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7175</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Whois API free description image" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-300x300.jpg 300w, https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API-70x70.jpg 70w, https://shreshtait.com/blog/wp-content/uploads/2024/08/Whois-API.jpg 500w" sizes="auto, (max-width: 150px) 100vw, 150px" />Are you looking for a reliable, easy-to-use, and free Whois API? Our new Whois API service offers fast, accurate domain information data, making it an ideal solution for security researchers, SOC analysts etc The Whois API provides the creation date and registrar name. The API requires no registration or token generation. The above request, returns [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/08/whois-api-free/">Whois API free</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Community Services</title>
		<link>https://shreshtait.com/blog/2024/08/community-services/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Tue, 06 Aug 2024 09:30:00 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Protective DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[domain shadowing attacks]]></category>
		<category><![CDATA[newly registered domain names]]></category>
		<category><![CDATA[open resolvers]]></category>
		<category><![CDATA[shadowfinder]]></category>
		<category><![CDATA[shadowfindr]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6999</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Shreshta Community Services image" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/08/1-1.png 500w" sizes="auto, (max-width: 150px) 100vw, 150px" />This page lists the community services we offer, including our CheckOpenResolver, ShadowFinder, Newly registered domain name feeds and Whois API etc Checkopenresolver This service allows Internet users to verify if their router, firewall, or CPE (Customer Premises Equipment) device functions as an open resolver. An open resolver can be exploited in DNS amplification attacks, posing [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/08/community-services/">Community Services</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>APAC DNS Forum</title>
		<link>https://shreshtait.com/blog/2024/08/apac-dns-forum/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Sat, 03 Aug 2024 07:25:01 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[apac dns forum]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dns security]]></category>
		<category><![CDATA[domain shadowing attacks]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[shadowfinder]]></category>
		<category><![CDATA[shadowfindr]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=7140</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="APAC DNS Forum logo" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-300x300.jpg 300w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-768x768.jpg 768w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile-70x70.jpg 70w, https://shreshtait.com/blog/wp-content/uploads/2024/08/channels4_profile.jpg 900w" sizes="auto, (max-width: 150px) 100vw, 150px" />Our CEO Swapneel Patnekar recently delivered a presentation titled &#8220;Who is living off your domain name?&#8221; at the ICANN APAC DNS Forum 2024. About APAC DNS Forum The Asia Pacific Domain Name System Forum is a meaningful platform for the regional DNS community to network, exchange ideas, and explore collaboration opportunities in relation to the [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/08/apac-dns-forum/">APAC DNS Forum</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>ShadowFindr &#8211; Uncover domain shadowing attacks</title>
		<link>https://shreshtait.com/blog/2024/03/shadowfindr-uncover-domain-shadowing-attacks/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 16:07:29 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[domain registrant]]></category>
		<category><![CDATA[domain registrar]]></category>
		<category><![CDATA[domain shadowing]]></category>
		<category><![CDATA[shadowfinder]]></category>
		<category><![CDATA[shadowfindr]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6549</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/03/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Owl hiding in a tree symbolizing the concept of Who is living off your domain name" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/03/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/03/hans-veth-YXUopi5p-bc-unsplash-70x70.jpg 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />At the DNS Community Day organized by DNS-OARC at the APRICOT 2024/APNIC 57 conference, we released ShadowFindr, a web tool to detect potential domain shadowing attacks. Who is living off your domain name? ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks. We have written about domain [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/03/shadowfindr-uncover-domain-shadowing-attacks/">ShadowFindr &#8211; Uncover domain shadowing attacks</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>DNS-OARC DNS Community Day</title>
		<link>https://shreshtait.com/blog/2024/03/dns-oarc-dns-community-day/</link>
		
		<dc:creator><![CDATA[Vivek Halappanavar]]></dc:creator>
		<pubDate>Tue, 12 Mar 2024 15:35:22 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[apnic 57]]></category>
		<category><![CDATA[apricot 2024]]></category>
		<category><![CDATA[checkopenresolver]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dns community day]]></category>
		<category><![CDATA[dns oarc]]></category>
		<category><![CDATA[dns-oarc]]></category>
		<category><![CDATA[open resolvers]]></category>
		<category><![CDATA[shadowserver]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6530</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/DNS-Community-Day@2x-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="dns-oarc community day apricot" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/DNS-Community-Day@2x-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/DNS-Community-Day@2x-70x70.png 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />The DNS-OARC folks organized a DNS Community Day at the APRICOT 2024/APNIC 57 conference on 26th February 2024. About DNS-OARC The DNS Operations, Analysis, and Research Center (DNS-OARC) brings together key operators, implementors, and researchers on a trusted platform so they can coordinate responses to attacks and other concerns, share information and learn together. The [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/03/dns-oarc-dns-community-day/">DNS-OARC DNS Community Day</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Domain shadowing</title>
		<link>https://shreshtait.com/blog/2024/02/domain-shadowing/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Sat, 24 Feb 2024 13:15:06 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[domain shadowing]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=6423</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of an owl hidden in a tree, notion is very similar to a domain shadowing attack" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/hans-veth-YXUopi5p-bc-unsplash-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/hans-veth-YXUopi5p-bc-unsplash-70x70.jpg 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Domain shadowing is a technique listed by MITRE ATT&#38;CK as T1584.001 sub-technique of T1584 This technique is not to be confused with subdomain hijacking What is a domain shadowing attack? Threat actors gain control of the DNS control panel of legitimate domain names by brute force and stealthily insert subdomains pointing to the attackers&#8217; network [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/domain-shadowing/">Domain shadowing</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 20/67 queries in 0.016 seconds using Disk

Served from: shreshtait.com @ 2026-04-30 20:54:25 by W3 Total Cache
-->