Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Nation-State

New DNS Attack Enables ‘Nation-State Level Spying’ via Domain Registration

A new domain name system (DNS) attack method that involves registering a domain with a specific name can be leveraged for what researchers described as “nation-state level spying.”

A new domain name system (DNS) attack method that involves registering a domain with a specific name can be leveraged for what researchers described as “nation-state level spying.”

The attack method was identified by researchers at cloud infrastructure security company Wiz while conducting an analysis of Amazon Route 53, a cloud DNS web service offered to AWS users. The findings were presented this week at the Black Hat cybersecurity conference in Las Vegas.

Route 53 provides roughly 2,000 DNS servers that have names such as ns-852.awsdns-42.net. The Wiz researchers discovered that registering a domain with such a name and adding it in Route 53 to the DNS server with the same name had some interesting results if they linked the domain to the IP address of a server they controlled.

DNS records in Route 53

“Whenever a DNS client queries this name server about itself (which thousands of devices do automatically to update their IP address within their managed network – more on that in a minute), that traffic goes directly to our IP address,” the researchers explained in a blog post published following their Black Hat presentation.

They claim to have received DNS traffic from more than 15,000 organizations, including Fortune 500 companies, 45 U.S. government agencies, and 85 government agencies from other countries. The intercepted data included internal and external IP addresses, computer names, user names, and office locations.

This data was included in dynamic DNS traffic from Windows devices. According to the researchers, the issue is related to an algorithm used by Windows devices to find and update the master DNS server when IP addresses change.

“[The leaked traffic] gives anyone a bird’s eye view on what’s happening inside companies and governments. We liken this to having nation-state level spying capability – and getting it was as easy as registering a domain,” the researchers said.

To demonstrate the potential impact of such an attack, they used the harvested data to map the location of employees of a major services company based on traffic received from more than 40,000 computers.

Advertisement. Scroll to continue reading.

Mapping based on DNS traffic data

They claim that such location mapping has also enabled them to determine that a major commodity trading firm and a large credit union’s subsidiary apparently have employees in countries that are sanctioned by the United States, which would represent a violation of those sanctions.

After being informed about the issue, Amazon and Google implemented fixes, but Wiz believes other DNS providers could be vulnerable as well, which means such attacks would still be possible.

Microsoft was also notified, but the tech giant said it was a “known misconfiguration that occurs when an organization works with external DNS resolvers,” rather than a vulnerability.

Wiz says that while service providers could take some steps to prevent such incidents, organizations can prevent such data leakage by ensuring that DNS resolvers are properly configured to prevent dynamic DNS updates from leaving the internal network.

Related: NSA, DHS Issue Guidance on Protective DNS

Related: TsuNAME Vulnerability Can Be Exploited for DDoS Attacks on DNS Servers

Related: At Least 100 Million Devices Affected by “NAME:WRECK” DNS Flaws in TCP/IP Stacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...