Cyber Threat Background
In early 2025, a SecuLore CyberSight™ public sector client faced a targeted cyber threat from a foreign actor linked to an advanced persistent threat (APT) group. The suspicious activity originated from an Iranian IP address known to target county infrastructure.
This client provides critical internet infrastructure for a county, including DNS (Domain Name System) servers and public-facing websites.
SecuLore’s threat detection and response solution was prepared to alert the client to thwart the threat before it escalated.
Threat Detection
The threat involved a DNS query to an outdated domain on one of the client’s servers. This domain no longer existed and had no associated records. The request—transmitting just two bytes of data—was captured by SecuLore’s CyberDSP, which passively monitors traffic within the client’s network.
At first glance, the query didn’t appear unusual. However, SecuLore’s Security Operations Center (SOC) flagged the activity based on analyst intuition and experience.
Normally, a DNS query for a defunct domain would simply return an error. But in this case, the query successfully reached a current county DNS server—suggesting that it was manually crafted and that the threat actor had specific knowledge of the county’s infrastructure.
While unsolicited DNS queries are not uncommon—especially for name servers—the origin, specificity, and delivery of this query indicated reconnaissance activity. It was akin to a burglar updating a blueprint or photographing a building before a break-in.
Threat Response
SecuLore’s dedicated SOC team—monitoring this client’s environment 24/7—recognized the anomaly and promptly escalated the alert.
Based on historical behavior and threat intelligence, the team identified the traffic as suspicious and well outside expected patterns. The query’s structure and source pointed to deliberate reconnaissance—an early-stage attempt to map the client’s systems.
By alerting the client quickly, SecuLore empowered them to assess their exposure, strengthen configurations, and take preemptive steps to defend against potential exploitation.
Proactively Mitigating the Threat
Alerting the client to this targeted threat gave them the opportunity to strengthen their systems and make informed decisions about their network security posture. Knowing they were being specifically targeted by a group known to exploit vulnerabilities in government systems allowed them to take proactive action before damage could occur.
As the old adage goes, “an ounce of prevention is worth a pound of cure.” In this case, early identification of reconnaissance behavior gave the client crucial insight: their infrastructure was being scanned and probed using outdated requests—indicating the threat actor was mapping their systems and potentially planning future attacks.
Threat Detection and Response Lessons Learned
This case highlights a critical takeaway: effective cyber defense isn’t just about technology—it’s about pairing proactive detection tools with expert human judgment.
SecuLore’s CyberSight platform, deployed through the CyberDSP sensor on the client’s network, detected a single DNS query transmitting only two bytes of data—barely a blip on most monitoring systems. Yet, our Security Operations Center (SOC) recognized the significance of this subtle activity: the query originated from an Iranian IP with a history of targeting government infrastructure, and it was aimed at an outdated domain still resolving through a county DNS server.
It wasn’t on a blacklist. It didn’t set off conventional alarms. But our SOC 2 analyst—dedicated to this client—recognized the pattern as potential reconnaissance and immediately escalated it. That decision allowed the client to act before the threat progressed further.
This is the power of deep packet inspection, backed by real-world experience. Technology captured the data; human expertise understood its implications.
Understanding how your network is exposed—what services are reachable from the internet, who’s communicating with them, and how they’re configured—is essential to protecting critical infrastructure. Unexpected or abnormal queries, even tiny ones, can offer clues about larger intentions.
SecuLore’s CyberSight service includes:
- Deep visibility into network traffic through CyberDSP sensors
- 24/7 monitoring by U.S.-based SOC analysts
- Heuristic threat analysis to detect emerging and targeted attacks
- Client-specific context for more accurate threat response
Our team doesn’t just watch for threats—we understand them. And we partner with you to take action before they escalate.
Contents
Other Resources
- Threat Detection and Response: A Case Study in Human Expertise
- Why SOAR Isn’t the Right Cybersecurity Fit for Public Safety
- World Backup Day: Essential Backup Strategies for Public Safety & Government
- Managed Detection and Response FAQ: Everything Public Safety Agencies Need to Know
- What is Deep Packet Inspection (DPI)?