Dynadot

DNS Cache Poisoning Opens Doors for Internet Criminals

Spaceship Spaceship
Watch
Impact
18
DNS Cache Poisoning Opens Doors for Internet Criminals

Ed Dickson July 26, 2008

The electronic universe seems to get more dangerous all the time. A new systems vulnerability called DNS Cache Poisoning might allow an Internet bad guy (or gal) to redirect you to a malicious site without your knowledge. In the majority of instances, malicious sites are designed to steal personal and financial information.

DNS Cache Poisoning is a flaw in what is referred to as the domain name system (DNS) that allows domain names like "Walmart.com" to be changed into numeric code. In layman's terms, this makes it easier for networking hardware to route search requests. When exploited by hackers, the flaw could allow them to redirect Internet users to malicious sites.

Security Resercher Dan Kaminsky—who discovered the flaw several months ago—reported it to the authorities and had been working in secret with the major security vendors on a fix. The plan was to coordinate a response before criminals discovered the flaw and started exploiting it. In March, experts from all over the world met at the Microsoft campus to put this plan into motion.

On Wednesday, instructions on how to use this flaw were posted on the Internet. Subsequently, these "instructions" (computer code) were put into a hacker tool called Metasploit, which makes them easy to use by not very technically inclined criminals.

Easy-to-use tools, sometimes referred to as DIY (do-it-yourself) kits, have been blamed for the ever-increasing crime levels we see on the Internet today. They are sold fairly openly and sometimes even come with technical support.

Metasploit is open-source computer project used to research exploits and vulnerabilities. While considered a useful tool by researchers, it can also be used by criminals to exploit vulnerabilities within systems.

Dan Kaminsky did an interesting blog post explaining this in detail that contains a DNS Checker tool (top right corner of the page) to see if your internet service provider (ISP) has patched the flaw. I highly recommend everyone tests their system using this tool!

Thanks to this information being released on the Internet before everyone could get their systems fixed, the first attacks using this flaw are being seen in the wild (on the Internet). Yesterday, James Kosin announced on his blog that the attacks are starting and it's time to patch or upgrade now. Websense also announced the same thing with a security alert.

Impromptu research by Kaminsky reveals that as of yesterday just over 50 percent of the unique name servers are vulnerable to this attack. On July 9th, roughly 85 percent of the unique name servers were vulnerable. Undoubtedly, there are a lot of computer security types working this weekend.

Individual users, who have their systems set for automatic updates probably will receive the patch as soon as it is released by their provider. Please note that older systems might still be vulnerable until they are updated.

I guess the best thing for us "little people" to do is to make sure our systems are updated. I would recommend doing it manually if you aren't set up for automatic updates.
http://blogcritics.org/archives/2008/07/26/183156.php
 
0
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
This is far from a new thing and has been a phenomenon for a long time.

For example HERE is news results in google from 2003-2004 (as far back as Google goes).
 
0
•••
Wouldn't happen if parents beat their kids asses like when I was young. Now it is illegal to even look at them mean.
 
0
•••
1
•••
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back