Feeds

Black hats attack gaping DNS hole

Fake Google exploit 'wildly mature'

Security for virtualized datacentres

Miscreants are actively exploiting a gaping hole in the internet's address lookup system that can cause millions of web surfers to receive counterfeit pages when they try to access online banking services and other types of websites.

The first confirmed instance came on Tuesday, when security researcher H D Moore discovered a domain-name service server operated by AT&T had been compromised. The attack caused Moore and other AT&T subscribers to be redirected to a fake Google page that tried to push affiliate advertising sites.

According to Dan Kaminsky, the researcher who first warned of the DNS vulnerability, "there are definitely other confirmed attacks," but non-disclosure agreements prevent him from giving details.

Equally concerning, Kaminsky said, is the sophistication the AT&T attackers showed in carrying out their attack. Rather than use exploit code added last week to Metasploit, a penetration testing kit that just happens to be maintained by Moore, the miscreants fashioned their own program that stealthily redirected users trying to visit Google to an impostor site.

"That was a wildly mature attack," Kaminsky told The Register. "Someone had an entire infrastructure built to attack Google's click-fraud system. That's a significant amount of code."

For more than a week, other researchers pointed to an increase in queries to DNS servers and other evidence suggesting attacks, but the AT&T exploit is the first to be documented.

As we reported last week, AT&T was one of the many laggard internet service providers reported to be dragging their feet in applying patches that fix the devastating DNS flaw. Kaminsky says more ISPs appear to be getting the message. Last week, about 51 per cent of unique name servers tested on his site (see the "check my DNS" button to the right) showed up as vulnerable. Now, he says it's closer to 35 percent.

In most cases, installing the patch is a straight-forward affair, but not always. Paul Vixie, head of the organization that maintains Berkeley Internet Name Domain, the net's most popular DNS server software, recently said updates patching the flaw could cut performance under heavy loads. Vixie said he believed fixing the flaw was more important than suffering slower performance. An update improving performance is in the works.

Even still, it's been more than three weeks since Kaminsky, Vixie and a choir of other influential net figures began imploring organizations to run the patch. Now that attacks have been confirmed in the wild, it's hard to imagine a justification for not doing so.

To test whether your ISP is an offender, please run the tests here or here, and report the results in the comments section. Be sure to include the name server's IP address and the name of the ISP. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.