Massive DNS poisoning: What happened to brazilian ISPs?

What is purpose for DNS cache poisoning attacks?

DNS cache poisoning is an  attack methodology used to compromise in the Domain Name System and is made introduceding data artifacts into a DNS name server’s cache database that did not originate from authoritative sources. Consider that the domain name server translates a domain name into an specific IP address related to the host, so poisoning a DNS is possible to force it to return not correct IP address and this makes it possible traffic redirection to another destination.

In this mode trusted URLs may be associated with rogue IP addresses and thus a user might be exposed to phishing, exploits or other malicious websites. This redirection is completely transparent, users just type the URL of the desired web site into their browser. It only takes one malicious change – it’s not hard to imagine how devastating the damage caused by a rogue DNS server can be.

The DNS system is a massive distribioted database with billions of domain names and IP addresses.  The system handles billions of requests everyday as people surf the internet, send email, a create new websites.

During last weeks, according to Fabio Assolini a Kaspersky Lab threat expert, several Brazilian ISPs have fallen victim to a series of DNS cache poisoning attacks. Users have been redirected to infected web site to install malware on they machines before to be connected to desidered sites. Some incidents have also featured attacks on network devices, where routers or modems are compromised remotely.  Let consider that Brazil has more than 73 million of computers that access to internet using main ISPs and this massive attack has been addressed versus a hugh quantity of customers. Consider that each of them was not able to access to principal web sites like YouTube, Gmail and Hotmail. In all cases, users were asked to run a malicious file as soon as the website opened. It was called ‘Google Defence’ software required to use the search engine. Of course Kaspersky’s threat researcher says the file is really a trojan banker that exploits CVE-2010-4452 and running arbitrary code in an old installation of JRE.

The DNS cache poisoning attacks is primary used to redirect all users to phishing websites or to infected web site that try to install malware software. Similar attacks as been done versus network devices of some companies that reported a remote access to their routers to change DNS configurations. In this case the observed efeect is similar so when employees of the attacked companies tried to open any website they were requested to execute a malicious Java applet.


But how is possible to attack network devices directly? Main problems related network devices are:

  • Weak default passwords
  • Insecure default configurations
  • No password management policy
  • Firmware vulnerabilities

The possible consequences of unauthorized access to the router are

  • The capture of network traffic
  • The risk of open backdoors (port forwarding)
  • The ability to eavesdrop on VoIP conversations
  • The theft of WEP/WPA keys
  • The possibility to change a device’s configuration, password included

How can mitigate the problem related DNS poisoning?

Cache poisoning can be prevented on DNS servers introducing mechanisms to increase trusting level of the information passed to them by other DNS servers. Versions of BIND can do it.

Secure DNS (DNSSEC) uses cryptographic electronic signatures signed with a trusted public key certificate to determine the authenticity of data. DNSSEC can fight cache poisoning attacks, but as of 2008 was not yet widely deployed.  In 2010 DNSSEC was implemented in the Internet root zone servers.

References

http://www.securelist.com/en/blog?author=52

http://www.dnssec.net/

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

57 mins ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

3 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

17 hours ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

24 hours ago

Researchers released exploit code for actively exploited Palo Alto PAN-OS bug

Researchers released an exploit code for the actively exploited vulnerability CVE-2024-3400 in Palo Alto Networks'…

1 day ago

Cisco warns of large-scale brute-force attacks against VPN and SSH services

Cisco Talos warns of large-scale brute-force attacks against a variety of targets, including VPN services,…

1 day ago

This website uses cookies.