Article 46R2X A DNS hijacking wave is targeting companies at an almost unprecedented scale

A DNS hijacking wave is targeting companies at an almost unprecedented scale

by
Dan Goodin
from Ars Technica - All content on (#46R2X)
evacuation-route-800x600.jpg

Enlarge (credit: Quentin Meulepas / Flickr)

Federal authorities and private researchers are alerting companies to a wave of domain hijacking attacks that use relatively novel techniques to compromise targets at an almost unprecedented scale.

The attacks, which security firm FireEye said have been active since January 2017, use three different ways to manipulate the Domain Name System records that allow computers to find a company's computers on the Internet. By replacing the legitimate IP address for a domain such as example.com with a booby-trapped address, attackers can cause example.com to carry out a variety of malicious activities, including harvesting users' login credentials. The techniques detected by FireEye are particularly effective, because they allow attackers to obtain valid TLS certificates that prevent browsers from detecting the hijacking.

"A large number of organizations has been affected by this pattern of DNS record manipulation and fraudulent SSL certificates," FireEye researchers Muks Hirani, Sarah Jones, Ben Read wrote in a report published Thursday. "They include telecoms and ISP[s], government and sensitive commercial entities." The campaign, they added, is occurring around the globe at "an almost unprecedented scale, with a high degree of success."

Read 8 remaining paragraphs | Comments

index?i=PjjfnbYbJZI:69PU3rv6OHw:V_sGLiPB index?i=PjjfnbYbJZI:69PU3rv6OHw:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments