Feeds

DNS attacks attempt to mislead consumers

Redirects to hacker-owned sites

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Employees at more than 500 companies have fallen victim to domain attacks in the last month, underscoring the increasing popularity of the tactic among Internet fraudsters, security experts said this week.

The attacks aim to redirect consumers to potentially malicious web servers by changing the records used to convert domain names to numerical addresses. Known as domain-name system (DNS) cache poisoning, the decade-old technique has been repurposed as another way for online fraudsters to install aggressive advertising software, or adware, on victims' computers and redirect people to pay-per-click Web sites.

"Over the last two years, we have seen a progression from hobbyist virus writers to people who are trying to make money," said Kyle Haugsness, a security incident handler for the Internet Storm Center, which has been tracking the latest spate of attacks. "The goal is to make the most money in the shortest amount of time."

Phishing attacks use email to attempt to lure users to click on a link, sending the victim to an attacker-controlled site. The latest type of attack, sometimes referred to as pharming, redirects a victim trying to go to popular legitimate sites instead to a malicious website or a pay-per-click website.

"We see the pharming attacks as being very effective as the next wave of phishing," said Richard Stiennon, vice president of threat research for Webroot Software, an anti-spyware software maker. While many Internet users might not fall victim to a fraudulent email message, a well executed pharming attack can be much harder to detect, he said.

"If we logged into our bank (and were redirected), we might not recognize where we were going before it's too late," he said.

Stiennon also stressed that money is the primary motive. Data from adware firms indicate that each PC installed with the software accounts for about $2.40 in annual revenue, he said. Pairing that data withWebroot's findings that the average PC scanned with the company's software has 2.5 adware programs suggests that adware firms garner nearly $2bn in annual revenue, or about 20 per cent of the more traditional online advertising market.

The Internet Storm Center, which collects and analyzes firewall log data to detect Internet threats, found that at least three attacks have used DNS cache poisoning since early March. Two of the attacks aimed to drive victims to adware installation sites, while the other appeared only to redirect browsers to a Web site advertising herbal supplements. From the Internet addresses included in one of the logs sent to the ISC, Haugsness estimates that between 500 and 1,000 companies were affected by the attacks in March.

Only one attack, which started April 1, continues to be a problem, ISC's Haugsness said. Yet, because the group does not know the full extent of the problem, it raised its online-threat condition to yellow on Tuesday.

"Some people were holding out -- we keep getting reports," Haugsness said. "We only received 25 e-mails from people on March 4, but we have information that it is way bigger."

The attackers have targeted corporate domain name servers that convert an employee's Internet requests from names to numerical addresses. The initial attack concentrated on compromising DNS servers using a known, and patched, vulnerability in gateway products from security company Symantec. (SecurityFocus is a subsidiary of Symantec.) Later attacks concentrated on exploiting DNS servers running on Windows NT and older versions of Windows 2000, which are vulnerable to certain exploits, Haugsness said.

No supported Microsoft products are vulnerable to DNS cache poisoning in their default configuration, the software giant said in a statement.

The attacks focused on redirecting local users from popular sites to attacker-owned sites.

One attack replaced the addresses of major financial, corporate and media Web sites with the addresses attacker-controlled servers. An employee at a company with a compromised DNS server would be redirected when attempting to view any of a the targeted Web sites, including American Express, Citibank, Fedex, OfficeMax, CNN and WebEx, to name a few. The sites themselves were not compromised.

A victim would be redirected to hostile web servers that attempted to use two exploits for Microsoft's Internet Explorer browser to load adware onto the person's computer, according to the Internet Storm Center's analysis.

Another attack used DNS cache poisoning to send any local .com request to another site. A victim would be redirected a number of times, eventually driving them to an affiliate-based pay-for-click network, according to an analysis completed by security firm LURHQ.

A representative of the pay-for-click firm could not immediately be reached for comment.

Such schemes will likely not end up in being very successful, as pay-for-click sites should be able to detect misuse, said Joe Stewart, a senior researcher at security firm LURHQ. Yet, the amount of money garnered from the attack is not a good measure of its impact, he said.

"Unfortunately there is no way to make a correlation between the amount of damage they are causing and the amount of money they are making," Stewart said. "They aren't making millions, but they are causing millions of dollars in damage."

Other attacks, such as a recent instant messaging worm, changes the local domain list, known as the hosts file, on the victim's computer. This has the same effect as DNS cache poisoning but only affects a single user. A program executed by a user with administrator privileges can change the hosts file.

Administrators should secure their DNS servers and make sure they are fully patched. New technologies such as security extensions for DNS still have a ways to go before they have some effect, Haugsness said.

"There are a lot of people that think DNS security extensions are going to be the fix for all the DNS problems," he said. "It is not widely deployed yet, so we don't know if that is going to be the case."

Copyright © 2005, SecurityFocus logo

Related stories

Desperate housewives spam used to spread spyware
The strange decline of computer worms
Rise of the botnets
DNS cache poisoning bugs hits Symantec shops

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.