Security Experts:

Connect with us

Hi, what are you looking for?


Cybersecurity Funding

HYAS Unveils New Tool for Continuous DNS Monitoring

Canadian security firm HYAS Infosec has released a new DNS protection tool dubbed HYAS Confront that was designed to provide clear visibility into DNS transactions into production networks.

Canadian security firm HYAS Infosec has released a new DNS protection tool dubbed HYAS Confront that was designed to provide clear visibility into DNS transactions into production networks. While there are existing corporate network DNS products available, Confront is claimed to be the first solution to continuously cover the entire production network regardless of its cloud location.

HYAS Confront provides continuous and complete passive DNS monitoring. It does not attempt to examine the content of communications, but merely determines the source and destination of the communication. If internal communication is deemed suspicious, or if external communication is deemed dangerous, Confront reports this to the customer’s SIEM, SOAR or SOC.

It takes no automatic action against the communication beyond reporting. The concern over false positives weighs heavy on production networks. “All systems are vulnerable to an occasional false positive,” comments HYAS CEO David Ratner; “and a false positive in the production environment could be disastrous from a revenue perspective. So, Confront is passive. It uniquely sees every single communication, and we can uniquely understand whether that communication is good, bad or ugly.”

On implementation, Confront generates a baseline of normal healthy activity. This usually takes just a few days. Internally, it could subsequently detect suspicious lateral movement indicative of adversarial presence. External communication toward a known bad or simply suspect destination could be indicative of malware beaconing to its C&C.

Confront does not directly detect the malware – it detects the activity of resident malware or adversaries. HYAS CEO David Ratner gives the SolarWinds attacks as an example. “Sunburst malware could get into your network,” he said. “It would lay low for 15 days and it would then wake up and issue a DNS request to its command and control: do I have any instructions? It is this DNS request that Confront immediately detects. And well over 93% of all malware today uses DNS to talk to its command and control.”

The presence of Sunburst was not the problem – it was the activity of Sunburst that was the danger. The same principle applies to the majority of malware. It is contact with the C&C server that spells danger. If Confront can detect that initial beaconing, the security team can be alerted to take immediate remedial action.

The strength of such a system is directly related to its knowledge of dangerous destinations. HYAS started life as a threat intelligence company. It continues this work and has an extensive and continuously maintained adversarial infrastructure database available to support its DNA analysis.

But it’s not just known C&C destinations that can be monitored – non-malign but potentially dangerous activity can also be highlighted. Confront is delivered with a range of policies built-in, and these can be increased and enhanced by the customer. “We find employees Bitcoin mining on VMs, we find intermixing of PCI and non-PCI traffic, we find going to public repositories in Russia and Eastern Europe rather than using a local mirror… All of these are examples that aren’t necessarily nefarious.” But they are certainly indicative of risk.

The firm also claims that Confront can reveal issues like misconfigurations, and incomplete removal of malware after an attack. The ability to detect misconfigurations comes from the deep level of visibility afforded by monitoring all DNS connections. Confront will detect a newly spun up box or database that may be behaving abnormally. It can ask the security team, says Ratner, “Do you realize that this new machine was spun up and put in your lab environment when it should have been put in your staging environment; do you realize that you spun up a new database, but you put it in the wrong configuration file; do you realize that you put this in zone 1 and it should have been in zone 2?”

Incomplete removal of malware will be detected when the remaining malware again beacons to its C&C. Ratner gave the example of a customer that had been breached, paid a vast amount for system cleansing, and then installed Confront. “Confront very quickly found 11 different backdoors to China that had been completely missed by the formal cleanup,” said Ratner.

“Production environments are critical to a company’s ability to function,” he said. “Unfortunately, no matter how strong your perimeter is, bad actors will eventually find a way in. HYAS Confront’s distinctive ability to detect anomalies within your production environment ensures that even in these cases, you can uncover the problem before it does damage.”

Hyas, headquartered in British Colombia, Canada, was founded by Christopher Davis, Sasha Angus, and Steve Heyns in 2015. It raised $16 million in a Series B funding round in 2021, bringing the total raised to almost $25 million.

Related: NSA, DHS Issue Guidance on Protective DNS

Related: Akamai to Acquire DNS Security Firm Nominum

Related: Iranian Hackers Heavily Reliant on DNS Tunneling

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


Twenty-one cybersecurity-related M&A deals were announced in December 2022.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...


More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...