IT.COM

security Retroactive Identification of Targeted DNS Infrastructure Hijacking

Spaceship Spaceship
Watch

Future Sensors

78% of human domainers will be replaced by robotsTop Member
Impact
23,283
Retroactive Identification of Targeted DNS Infrastructure Hijacking

Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, KC Claffy, Geoffrey M. Voelker, Stefan Savage
ACM Internet Measurement Conference (IMC ’22)

Abstract

In 2019, the US Department of Homeland Security issued an emergency warning about DNS infrastructure tampering. This alert, in response to a series of attacks against foreign government websites, highlighted how a sophisticated attacker could leverage access to key DNS infrastructure to then hijack traffic and harvest valid login credentials for target organizations.​
However, even armed with this knowledge, identifying the existence of such incidents has been almost entirely via post hoc forensic reports (i.e., after a breach was found via some other method). Indeed, such attacks are particularly challenging to detect because they can be very short lived, bypass the protections of TLS and DNSSEC, and are imperceptible to users. Identifying them retroactively is even more complicated by the lack of fine-grained Internet-scale forensic data.​
This paper is a first attempt to make progress at this latter goal. Combining a range of longitudinal data from Internet-wide scans, passive DNS records, and Certificate Transparency logs, we have constructed a methodology for identifying potential victims of sophisticated DNS infrastructure hijacking and have used it to identify a range of victims (primarily government agencies), both those named in prior reporting, and others previously unknown.​

This work was supported in part by National Science Foundation grants OAC-2131987, CNS-1705050, and CNS-2152644, the EU H2020 CONCORDIA project (830927), the NWO-DHS MADDVIPR project (628.001.031/FA8750-19-2-0004), and generous support from DigiCert.

Read more (PDF)

 
Last edited:
0
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back