NCSC issues guidance for combatting global DNS hijacking campaign

Middle East-based attacks expected to spread to consumers and businesses across Europe

Internet concept

The UK's National Cyber Security Centre has published guidance to governments, organisations and individuals who may be affected by a large-scale global DNS hijacking campaign.

The report stipulates most of the attacks have been isolated to the Middle East, but some impactful cases have been reported in both the UK and the US too. The techniques the attackers are using could also "feasibly be deployed against UK targets".

Advertisement - Article continues below

A Domain Name System (DNS) is like a telephone directory for the internet, routing Web traffic to the correct IP address - hijacking it can allow third-parties to potentially snoop on the traffic flowing to governments, businesses and consumers.

"In the campaign, attackers are believed to have compromised credentials that have given them the ability to manipulate DNS records, giving them the ability to redirect traffic to attacker-owned infrastructure," read the report.

If an attacker successfully hijacks a DNS, they could intercept traffic, placing confidential business information or credentials at risk of theft or exploitation through subsequent phishing attacks.

Two main techniques are being used in the hijacking campaign, the first of which relates to a DNS A (address) record - an entity responsible for mapping a domain name to the IP of the computer hosting that domain.

Advertisement
Advertisement - Article continues below

Attackers are altering these A records to reroute the target domain to the attackers IP address instead, allowing them to create a proxy that mirrors the intended recipient. A new TLS certificate is created when this happens which bypasses browser security warnings.

Advertisement - Article continues below

The second technique being used is similar to the first; attackers alter DNS Name Server records to achieve the same effect. Name Server records specify the servers which provide DNS services for the domain - a new TLS certificate is also created here, bypassing browser security.

What to do

Firstly, the NCSC recommends using two-factor authentication (2FA) on all domain registrar or registry accounts and use strong, unique passwords.

"Attackers may attempt to use account recovery processes to gain access to domain management, so ensure that contact details are accurate and up-to-date," read the report. "This is particularly relevant for DNS, as it's common for domains to be registered before corporate email accounts are available."

As for the DNS, users should enable any and all types of logging so changes can be reviewed. Backups of critical DNS zones are also recommended in case a recovery is necessary after a breach.

If you want to be ahead of the attackers, there are a few ways to pre-empt any malicious activity should they get a foothold on your system. Critical DNS record should be monitored regularly (monitoring software is widely available) for unexpected changes to Name Server records and the DNS A records associated with them.

Advertisement - Article continues below

You can also monitor Certificate Transparency logs for TLS certificates being issued for your domains - unexpected certificates could indicate a possible breach.

ISPs fight encrypted DNS

As it stands, internet service providers (ISPs) are fighting for their right to monitor web traffic as a new encrypted DNS system is being adopted to increase security.

There's a debate around whether these changes need to be made, some experts believe DNS is fundamentally weak and the changes are long overdue, while others claim it could scupper the Internet Watch Foundation's child abuse blacklist.

"DNS is fundamentally insecure," said Neil Brown, a network expert lawyer and founder of law firm Decoded Legal. "DNS is used - or abused - to do a number of things like content controls for court order site blocking. If you ask for the Pirate Bay, the number you get back isn't for the Pirate Bay."

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement
Advertisement

Recommended

Visit/security/malware/355093/evasive-malware-threats-are-surging
malware

Evasive malware threats doubled in 2019

24 Mar 2020
Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

2 Mar 2020

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/cloud/355098/ibm-dedicates-supercomputing-power-to-coronavirus-researchers
high-performance computing (HPC)

IBM dedicates supercomputing power to coronavirus research

24 Mar 2020