Home Latest News Rising Attacks on DNS Infrastructure

Rising Attacks on DNS Infrastructure

by CISOCONNECT Bureau

The rising attacks on DNS servers by the hackers have always yielded corporate and private information and the situation is a cause of concern for the Industry.

Recent Attacks
• Over a dozen ISPs across Europe, including EDP, FDN, Bouygues Télécom, SFR, K-net, Delta, Caiway, Online.nl, Signet, FreedomNet, and Tweak.nl. reported DDoS attacks that impacted their DNS infrastructure.
• More than 400 domains controlled by the U.K. government were found on DNS-based blacklists, impacting email communications. Typically, domains on an automated IP blacklist indicate issues in the email infrastructure such as the server sending spam or being exploited at some point.
• In the last few weeks of August, hackers have launched DDoS attacks against some of the largest financial organizations, targeting their DNS servers, backend infrastructure, and API endpoints. The list of victims includes the New Zealand Exchange (NZX), MoneyGram, Worldpay, PayPal, YesBank India, Braintree, and Venmo.
• Attackers were seen abusing Google DNS over HTTPS to download malware. While Google DNS helped in resolving a suspicious domain, the response returned through Google DNS carried the malicious payload in an encoded form.

Modus Operandi
• Cybercriminals target routers and reconfigure their DNS settings, directing victims to malicious websites instead of the pages they intend to visit.
• One of the techniques involves the use of botnets to target servers with massive volumes of DNS requests, flooding the servers with malicious requests, and blocking the legitimate ones.
• Attackers often abuse DNS to invade a private network, avoiding the same-origin policy — a mechanism that allows a webpage to access data from another page only if they both have similar hostnames, port numbers, and identifying numbers.

Mitigation
DNS service providers and administrators can prevent many attacks by following some recommended security measures. As part of their security operations, organizations can implement DNS record monitoring, use dedicated tools to track DNS hijacking attempts, ensure regular vulnerability patching, and implement Domain Name System Security Extensions (DNSSEC). Though there’s no magic bullet, DNS providers must take all the necessary steps to thwart such attacks.

Recommended for You

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads