Connect with us

Hi, what are you looking for?



New DNS Attack Enables ‘Nation-State Level Spying’ via Domain Registration

A new domain name system (DNS) attack method that involves registering a domain with a specific name can be leveraged for what researchers described as “nation-state level spying.”

A new domain name system (DNS) attack method that involves registering a domain with a specific name can be leveraged for what researchers described as “nation-state level spying.”

The attack method was identified by researchers at cloud infrastructure security company Wiz while conducting an analysis of Amazon Route 53, a cloud DNS web service offered to AWS users. The findings were presented this week at the Black Hat cybersecurity conference in Las Vegas.

Route 53 provides roughly 2,000 DNS servers that have names such as The Wiz researchers discovered that registering a domain with such a name and adding it in Route 53 to the DNS server with the same name had some interesting results if they linked the domain to the IP address of a server they controlled.

DNS records in Route 53

“Whenever a DNS client queries this name server about itself (which thousands of devices do automatically to update their IP address within their managed network – more on that in a minute), that traffic goes directly to our IP address,” the researchers explained in a blog post published following their Black Hat presentation.

They claim to have received DNS traffic from more than 15,000 organizations, including Fortune 500 companies, 45 U.S. government agencies, and 85 government agencies from other countries. The intercepted data included internal and external IP addresses, computer names, user names, and office locations.

This data was included in dynamic DNS traffic from Windows devices. According to the researchers, the issue is related to an algorithm used by Windows devices to find and update the master DNS server when IP addresses change.

“[The leaked traffic] gives anyone a bird’s eye view on what’s happening inside companies and governments. We liken this to having nation-state level spying capability – and getting it was as easy as registering a domain,” the researchers said.

Advertisement. Scroll to continue reading.

To demonstrate the potential impact of such an attack, they used the harvested data to map the location of employees of a major services company based on traffic received from more than 40,000 computers.

Mapping based on DNS traffic data

They claim that such location mapping has also enabled them to determine that a major commodity trading firm and a large credit union’s subsidiary apparently have employees in countries that are sanctioned by the United States, which would represent a violation of those sanctions.

After being informed about the issue, Amazon and Google implemented fixes, but Wiz believes other DNS providers could be vulnerable as well, which means such attacks would still be possible.

Microsoft was also notified, but the tech giant said it was a “known misconfiguration that occurs when an organization works with external DNS resolvers,” rather than a vulnerability.

Wiz says that while service providers could take some steps to prevent such incidents, organizations can prevent such data leakage by ensuring that DNS resolvers are properly configured to prevent dynamic DNS updates from leaving the internal network.

Related: NSA, DHS Issue Guidance on Protective DNS

Related: TsuNAME Vulnerability Can Be Exploited for DDoS Attacks on DNS Servers

Related: At Least 100 Million Devices Affected by “NAME:WRECK” DNS Flaws in TCP/IP Stacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.