• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

DNS Hijacking Prompts Historic CISA Emergency Directive

An ongoing malicious campaign targeting federal government websites prompted a historic response from the Cybersecurity and Infrastructure Security Agency (CISA). CISA DNA Hijacking emergency directiveThe agency, which operates under the banner of the Department of Homeland Security, issued its first ever emergency directive last week in an attempt to thwart a series of DNS hijacking attacks. Now, granted, at-risk executive branch agencies are the intended target of this directive. However, the threat vector it documents is something all organizations should be aware of – as are the defensive schemes.

CISA’s instructions come as evidence mounts of a persistent operation to hijack government accounts that manage agency website DNS records. CISA dismissed the techniques behind the campaign as not “especially innovative,” but that didn’t stop the agency from taking further action. DNS security is an all-too-common blind spot for organizations – both inside and outside the federal government. Failure to properly defend this weak point could allow criminals to intercept legitimate traffic, knock services offline, help themselves to sensitive data, and more.

So, what does CISA recommend federal agencies – and really any organization – do to prevent DNS hijacking? The emergency directive included four best practices gleaned from CISA’s own expertise as well as from the experience of other technology and security professionals, from the public and private sectors.

4 CISA-approved DNA defense best practices

Agencies – and, again, really all organizations – should:

  • Verify current DNS records to ensure traffic redirects as intended and not to an unknown third party
  • Update the passwords for any DNS management account to cut off the access of any unauthorized outsiders
  • Add multi-factor authentication to any DNS management accounts to provide an additional layer of security for this often-overlooked access point
  • Keep an eye on Certificate Transparency logs for suspicious activity, including phantom certificates

Defend your environment without further taxing your team

Despite its importance, there is a reason DNS security falls by the wayside for many organizations and even government agencies. Today’s technology teams are overwhelmed as it as and adding more manual tasks, such as regularly parsing DNS records and Certificate Transparency logs, will only worsen the matter. Furthermore, these routine tasks are often the first ones set aside in favor of higher value projects or more pressing fires.

One tool Arraya recommends for ensuring DNS security without adding more work to IT’s plate is Cisco Umbrella. Organizations are able to forward their DNS logs to Umbrella for analysis. If Umbrella identifies a change that would route DNS requests to high risk domains, it can block the move. Utilizing a solution such as Umbrella, backed by CISA’s best practices listed above, is an excellent way to transform DNS security from a weak point to a strength.

Want to learn more about Cisco Umbrella, DNS security and building a secure technology environment? Reach out to our team of cyber security experts now by visiting: https://www.arrayasolutions.com//contact-us/.

Also, let us know what you think of this post! Leave us any comments or questions through our social media presence. Arraya can be found on LinkedIn, Twitter, and Facebook. Then, follow us to keep up with our take on industry news and gain access to exclusive learning opportunities.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}