{"id":3345,"date":"2022-09-24T17:19:46","date_gmt":"2022-09-24T17:19:46","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=3345"},"modified":"2024-02-04T06:13:03","modified_gmt":"2024-02-04T06:13:03","slug":"phishing-campaign-targeting-github","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/","title":{"rendered":"Phishing campaign targeting Github"},"content":{"rendered":"\n<p>Earlier this week, on 21st September, GitHub published a blog post &#8211; <a rel=\"noreferrer noopener\" href=\"https:\/\/github.blog\/2022-09-21-security-alert-new-phishing-campaign-targets-github-users\/\" target=\"_blank\">Security alert: new phishing campaign targets GitHub users<\/a><\/p>\n\n\n\n<p>The gist of it was,<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>On September 16, GitHub Security learned that threat actors were targeting GitHub users with a phishing campaign by impersonating CircleCI to harvest user credentials and two-factor codes. While GitHub itself was not affected, the campaign has impacted many victim organizations.<\/p>\n<cite><a rel=\"noreferrer noopener\" href=\"https:\/\/github.blog\/2022-09-21-security-alert-new-phishing-campaign-targets-github-users\/\" target=\"_blank\">Security alert: new phishing campaign targets GitHub users<\/a><\/cite><\/blockquote>\n\n\n\n<p>In the blog post, GitHub outlined a list of phishing domains that were used in the campaign, <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg\" alt=\"Image of a screen displaying the Github website\" class=\"wp-image-5660\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg 683w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-200x300.jpg 200w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-768x1152.jpg 768w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>circle-ci[.]com<\/li>\n\n\n\n<li>emails-circleci[.]com<\/li>\n\n\n\n<li>circle-cl[.]com<\/li>\n\n\n\n<li>email-circleci[.]com<\/li>\n<\/ul>\n\n\n\n<p>Earlier today, 24th September 2022,  security researchers at <a href=\"https:\/\/shreshtait.com\">Shreshta IT<\/a> using our threat intelligence platform SDINET, have been able to detect and identify another phishing domain &#8211; links-circleci[.]com which is part of the phishing campaign targeting Github users. <\/p>\n\n\n\n<p><strong>Threat Indicator<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<ul class=\"wp-block-list\">\n<li>Domain Name &#8211; links-circleci[.]com<\/li>\n\n\n\n<li>Date created &#8211; 2022-09-12<\/li>\n\n\n\n<li>Registrar &#8211; NICENIC INTERNATIONAL GROUP CO., LIMITED<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p>At the time of writing this, except for circle-ci[.]com, all the other domains were either sink holed or null routed. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>circle-ci[.]com is still resolving to 176.113.115.140<\/li>\n\n\n\n<li>176.113.115.140 is an IP address under AS57678 (REDBYTES-AS, RU)<\/li>\n<\/ul>\n\n\n\n<p>We have reached out to GitHub Security team and shared the domain name links-circleci[.]com<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this week, on 21st September, GitHub published a blog post &#8211; Security alert: new phishing campaign targets GitHub users The gist of it was, On September 16, GitHub Security learned that threat actors were targeting GitHub users with a phishing campaign by impersonating CircleCI to harvest user credentials and two-factor codes. While GitHub itself [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[43,14,53,42],"tags":[50,45,75,54,76,48,47],"class_list":["post-3345","post","type-post","status-publish","format-standard","hentry","category-dns","category-information-security","category-sdinet","category-threat-intelligence","tag-campaign","tag-dns","tag-domain-name","tag-github","tag-india","tag-phishing","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing campaign targeting github<\/title>\n<meta name=\"description\" content=\"Shreshta threat intelligence team has detected a phishing campaign targeting Github users. The motive is to harvest credentials of the users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing campaign targeting Github\" \/>\n<meta property=\"og:description\" content=\"Shreshta threat intelligence team has detected a phishing campaign targeting Github users. The motive is to harvest credentials of the users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-24T17:19:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-04T06:13:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"Phishing campaign targeting Github\",\"datePublished\":\"2022-09-24T17:19:46+00:00\",\"dateModified\":\"2024-02-04T06:13:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/\"},\"wordCount\":208,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg\",\"keywords\":[\"campaign\",\"dns\",\"domain name\",\"GitHub\",\"india\",\"phishing\",\"threat intelligence\"],\"articleSection\":[\"DNS\",\"Information Security\",\"SDINET\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/\",\"name\":\"Phishing campaign targeting github\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg\",\"datePublished\":\"2022-09-24T17:19:46+00:00\",\"dateModified\":\"2024-02-04T06:13:03+00:00\",\"description\":\"Shreshta threat intelligence team has detected a phishing campaign targeting Github users. The motive is to harvest credentials of the users.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mohammad-rahmani-q1p2DrLBtko-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mohammad-rahmani-q1p2DrLBtko-unsplash.jpg\",\"width\":6336,\"height\":9504,\"caption\":\"Image of a screen displaying the Github website\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2022\\\/09\\\/phishing-campaign-targeting-github\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing campaign targeting Github\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"},\"sameAs\":[\"https:\\\/\\\/shreshtait.com\\\/blog\"],\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/author\\\/pswapneel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing campaign targeting github","description":"Shreshta threat intelligence team has detected a phishing campaign targeting Github users. The motive is to harvest credentials of the users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/","og_locale":"en_US","og_type":"article","og_title":"Phishing campaign targeting Github","og_description":"Shreshta threat intelligence team has detected a phishing campaign targeting Github users. The motive is to harvest credentials of the users.","og_url":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2022-09-24T17:19:46+00:00","article_modified_time":"2024-02-04T06:13:03+00:00","og_image":[{"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg","type":"","width":"","height":""}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"Phishing campaign targeting Github","datePublished":"2022-09-24T17:19:46+00:00","dateModified":"2024-02-04T06:13:03+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/"},"wordCount":208,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg","keywords":["campaign","dns","domain name","GitHub","india","phishing","threat intelligence"],"articleSection":["DNS","Information Security","SDINET","Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/","url":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/","name":"Phishing campaign targeting github","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash-683x1024.jpg","datePublished":"2022-09-24T17:19:46+00:00","dateModified":"2024-02-04T06:13:03+00:00","description":"Shreshta threat intelligence team has detected a phishing campaign targeting Github users. The motive is to harvest credentials of the users.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash.jpg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2022\/09\/mohammad-rahmani-q1p2DrLBtko-unsplash.jpg","width":6336,"height":9504,"caption":"Image of a screen displaying the Github website"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2022\/09\/phishing-campaign-targeting-github\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing campaign targeting Github"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},{"@type":"Person","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"},"sameAs":["https:\/\/shreshtait.com\/blog"],"url":"https:\/\/shreshtait.com\/blog\/author\/pswapneel\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/3345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=3345"}],"version-history":[{"count":31,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/3345\/revisions"}],"predecessor-version":[{"id":5661,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/3345\/revisions\/5661"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=3345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=3345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=3345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}