Only if you don’t understand DNS and Infosec. DNS traffic records are lookups and responses. They are not confidential. There's no "infiltrating" going on here. In fact, Joffe's company (Neustar) ran a huge DNS resolver. DNS servers and load balancers change DNS information, or return different answers to the same query, all the time. This is normal behavior, just to head off the "queries were changed" BS.
Infosec monitors DNS lookups all the time for evidence of attempted attacks and misuse. There's nothing unusual about that. This is basic data mining and aggregation. DNS monitoring as a service is a very popular business; a large number of companies engage with it as part of their infosec activities. Joffe's company was hired to monitor DNS traffic as part of a contract, and had been doing so for the government since at least 2014. This is legal.
Neustar had multiple contracts with the federal government, including one to provide DNS service. It's right there in Durham's statement. Together with its other business, it had the data, so no "spying." Neustar also provided researchers with DNS data that allowed them to map internet trends and look for malicious activity, among other things. These researchers found multiple mysterious lookups between Trump/Alfa/Spectrum Health.
So: the DNS information (lookups/responses) from the Trump Tower server indicated some weird behavior. There's probably nothing there, but it was pretty strange, and has not been explained. Joffe gave this information to Sussmann, his lawyer, who gave it to the FBI (or CIA, depending on the story). This was after Sussmann stopped representing the DNC. All of this came out last fall. Durham is trying to create a narrative that this indicates Sussmann's guilt of something or other, but he has produced little evidence of this. To try and demonstrate this, Durham conducted the same data analysis he says proves Sussmann's guilt, but against the Obama WH (2014).
Oh, and everyone just sat on this for five years until the SOL expired. It's all just so dumb. And this has been out there in the press since at least October, 2016, and in the Infosec community before that.
congrats on falling for the shiny object once again, you mark