Skip to content

How to detect and prevent DNS hijacking

Imagine trying to access a news website to catch up on the latest headlines. Still, instead of finding the articles you were looking for, you’re secretly redirected to a clone site designed to spread misinformation or to gather your personal data.

This scenario has become a reality for some, thanks to the Sea Turtle cyber espionage campaign. Linked to Turkey, this group has engaged in DNS hijacking, targeting not just any websites but those connected to telecommunications, media, ISPs, IT services, and Kurdish platforms in the Netherlands.

Their goal was to collect sensitive data on political dissidents and minority groups. DNS hijacking is often state-sponsored and used by governments to surveil and collect data on political adversaries and minority groups. These actors exploit the DNS system—essentially the internet’s phonebook—to manipulate how and where we access information online.

Businesses, too, face big risks from DNS hijacking. This threat can result in large financial losses, data breaches, and a decrease in customer trust. 

The cryptocurrency sector is especially at risk. Threat actors frequently hijack DNS to send users to fake websites and steal cryptocurrency assets. Because you can’t reverse cryptocurrency transactions, this approach is particularly dangerous. 

In this article, we’ll explore how to detect DNS hijacking in simple steps.

Key takeaways

  • DNS hijacking is an attack where someone redirects you to a different site that they control, which might look like the one you wanted but can steal your information or harm your computer.

  • The attack uses the DNS system, which normally helps your browser find websites, to send you to a fake website instead of the real one you wanted to visit.

  • Look out for being sent to unexpected websites, your internet running slowly, or warnings about a website’s security certificate to catch DNS hijacking early.

  • Protect yourself by using strong passwords for your router, updating its firmware, enabling DNSSEC validation, and using a VPN to encrypt your online activity.

  • Incidents like the Sea Turtle campaign and the attack on a Brazilian bank show how serious DNS hijacking can be and why strong security measures are important.

  • NordLayer helps protect against these threats with its DNS filtering service, which blocks harmful websites.

What is DNS hijacking?

Domain Name System (DNS) hijacking is a form of cyber-attack in which an attacker intercepts and redirects the DNS queries made by a user. Instead of reaching the intended website, the user is sent to a fraudulent site, often without realizing it. This technique can be used to steal personal information, distribute malware, or censor information.

Related articles

 

In Depth

What is content filtering?

13 Sep 202210 min read

Content Filtering

 

Product Updates

NordLayer features in review: DPI & DNS filtering

27 Sep 20229 min read

Filter online traffic with Virtual Private Gateway

 

How does DNS hijacking work?

DNS hijacking operates by using the DNS, which acts as the internet’s phonebook. Normally, when you enter a website address into your browser, your computer sends a DNS query to a DNS server to translate the domain name into an IP address. This IP address is what allows your browser to connect to the website’s server.

However, in a DNS hijacking scenario, an attacker intercepts or alters this query process. Instead of directing you to the correct IP address, the attacker redirects you to a fraudulent website or server that they control. This manipulated redirection can occur without any visible signs, making the user believe they are visiting a legitimate site.

For example, imagine you’re trying to log into your online banking account. You type the bank’s URL into your browser, expecting to be taken to your bank’s login page. If you’re a victim of DNS hijacking, you are sent to a counterfeit version of the bank’s website instead of reaching the real banking site. This site looks identical to the real one, but when you enter your login credentials, they are captured by the attacker.

Types of DNS hijacking

Understanding the various types of DNS hijacking is crucial for maintaining our online safety. Let’s explore the most popular ones.

Types of DNS hijacking attacks

Local DNS hijacking

This happens when malware changes the DNS settings on your device. If this occurs, your device might take you to places on the internet that you didn’t intend to visit, risking your personal information. It’s essential to keep your antivirus software up to date to catch and remove such malware.

Router DNS hijacking

Attackers target your internet router and change its DNS settings. This action affects all devices using that router. It’s like someone redirecting all the mail from your house to somewhere else. 

Ensuring your router’s firmware is regularly updated and its password is strong is a good practice to prevent DNS hijacking.

Man-in-the-middle DNS hijacking

In this scenario, attackers intercept your DNS requests. It’s as if someone catches a letter you’re sending out, opens it, and sends it somewhere else without you knowing. 

Using secure networks and VPN services can help safeguard against such interceptions.

DNS server hijacking

Here, the attackers take control of a DNS server and change its DNS records. This means they can redirect traffic from many users to malicious websites. It’s a broad DNS attack, affecting many at once. 

Internet Service Providers and organizations managing DNS servers need to monitor and secure their servers diligently.

ISP DNS hijacking

Sometimes, your Internet Service Provider might redirect your DNS queries. Although these redirects aren’t always malicious, they can still introduce security risks. Using a custom DNS service can give you more control over where your queries go, enhancing your privacy and security.

Cache poisoning (DNS spoofing)

Cache poisoning, also known as DNS spoofing, is a technique where attackers insert false information into a DNS server’s cache. When this happens, your computer, which relies on the DNS server to translate website names into IP addresses, gets misled. It takes you to a different website controlled by the attacker.

A DNS resolver is a crucial part of this process. It’s the tool that your computer uses to ask the DNS server, ‘What is the IP address for this website?’ When the resolver receives incorrect information from a poisoned DNS cache, it unknowingly directs you to the wrong place.

The DNS cache is where the resolver stores IP addresses it has recently looked up. If the cache gets poisoned, even future DNS requests can lead to the wrong sites until the DNS cache is cleared or the false entries expire.

Preventing cache poisoning involves ensuring your DNS resolver uses DNSSEC (DNS Security Extensions). DNSSEC is a security measure that ensures the information your resolver receives is authentic.

Rogue DNS server

If you’re tricked into using a rogue DNS server, it will intentionally mislead you by taking you to the wrong websites. This often leads to malicious websites. Being cautious about which DNS server you use and opting for reputable DNS providers can protect you.

Pharming

Pharming redirects you to fake websites without your click or consent, exploiting vulnerabilities either in your device or in DNS servers. It’s more sneaky than phishing. 

Employing robust security measures and staying vigilant about unusual browser behavior can help you stay clear of these traps.

DNS redirection by malware

When malware on your device redirects your DNS queries, it can make you think you’re visiting safe websites when you’re not. Regular scans with updated antivirus software can help detect and remove such malware.

DNS hijacking via trojan

A trojan can change your DNS settings or point you to a malicious DNS server. It often masquerades as legitimate software, tricking you into downloading it. Being cautious about what you download and keeping your security software up to date are good ways to avoid such threats.

Each type of DNS hijacking exploits our trust in the internet’s infrastructure. Remember, detecting DNS hijacking early and taking steps to prevent it are key to keeping your internet experience safe and secure.

Examples of DNS hijacking

Brazilian bank attack

Back in 2016, a big bank in Brazil was hit by a DNS hijacking attack. The threat actors changed the bank’s DNS settings, redirecting customers to fake websites instead of the bank’s real ones. These sites mimicked the bank’s authentic ones, tricking people into giving away their personal and banking info.

This incident showed how big of an impact DNS hijacking can have, especially on financial institutions, and showed the need to prevent DNS hijacking attacks. 

Sea Turtle campaign

The Sea Turtle campaign is a cyber espionage operation that started in 2019. It targets organizations across the globe to gather sensitive information. 

This group uses DNS hijacking because after redirecting internet traffic to malicious websites and stealing login credentials, they can spy on the data traffic of targeted entities. They opt for DNS hijacking because of its sneakiness; victims often don’t realize they’re visiting fake websites.

In 2024, Sea Turtle expanded its reach to include targets in the Netherlands, focusing on telecommunications, media, ISPs, IT services, and Kurdish websites. 

Iranian attack incidents

Iranian threat actors, known under the alias Lyceum, target the Middle East with DNS hijacking. They’ve introduced a new NET-based backdoor, evolving their tactics to manipulate DNS queries. 

The essence of this DNS hijacking lies in its execution through a macro-laced Microsoft Document, seemingly reporting legitimate news but actually serving as a trojan horse for the malware. It’s designed not just for spying but also for full control over the compromised systems. 

Companies need robust measures to detect and prevent DNS spoofing and similar DNS hijacking attacks.

How to detect DNS hijacking?

Here’s a guide on how to spot DNS hijacking, which includes simple steps that can help you figure out if a DNS attack has hit you.

Spot unexpected website redirects. Imagine you’re trying to visit your favorite news site but end up on a completely different page that asks for personal details. This could be a sign of DNS hijacking, where attackers redirect you to fake sites to steal your info.

Notice if your internet feels slow. If your web pages suddenly start taking longer to load, it might mean someone is messing with your DNS queries. This slowing down happens because the hijack adds extra steps to reach websites.

Use tools to check your DNS server. There are tools online that let you see if the DNS server your computer is using matches the one your Internet Service Provider (ISP) gave you. A mismatch might mean your DNS settings have been changed without you knowing.

Watch for SSL certificate warnings. When you visit a secure site, your browser checks its SSL certificate to ensure it’s safe. If you get a warning that something’s off, like the certificate doesn’t match the site’s name, it could mean you’ve been redirected to a harmful site by DNS hijacking.

Use network monitoring tools. These tools can spot odd behavior in your DNS traffic, like a sudden spike in DNS requests or visits to known bad sites. This can clue you in on possible DNS hijacking attempts.

Audit your DNS records. Check your domain’s DNS records with your registrar every so often. If you find changes you didn’t make, it might mean someone has hijacked your DNS.

Talk to your ISP. If you’re worried about DNS hijacking, a call to your ISP can be reassuring. They can check if the DNS servers you’re using are legit and offer tips on keeping your connection secure.

How to prevent DNS hijacking for businesses?

Keeping your online world safe from DNS hijacking is really important. Here’s a guide on how to prevent DNS hijacking attacks.

How to prevent DNS hijacking

Pick secure DNS servers. DNSSEC stands for Domain Name System Security Extensions. It’s a set of protocols that add a layer of security to the DNS lookup process, ensuring the information your network receives hasn’t been tampered with. Opting for DNS servers that support DNSSEC minimizes the risk of your business being directed to fraudulent websites.

Update your router’s password. Routers often come with default passwords that are easily predictable. Changing these passwords to something strong and unique is crucial for keeping attackers out. 

Keep your router’s firmware fresh. Router makers often fix security holes with new firmware updates. Staying up-to-date helps block paths that threat actors could use for DNS hijacking.

Turn on DNSSEC validation. Enabling DNSSEC validation across your network means that DNS responses are checked for authenticity before being accepted. This prevents attackers from redirecting your internet traffic to malicious sites through spoofed DNS responses, a common tactic in DNS hijacking. 

Use a business VPN. A Virtual Private Network encrypts what you do online, shielding you from certain DNS hijacking methods. Choosing a trusted VPN service adds a solid layer of protection.

Install and update security software. Antivirus and anti-malware programs can catch and delete harmful software that might change your DNS settings. Keeping this software up to date is key to fighting off new threats. 

Update everything. Software updates often patch up security weaknesses. Regularly updating your system and applications protects you from being an easy target for DNS hijacking.

Watch your DNS settings. Keep an eye on the DNS settings on your company’s devices and router. If something looks off, dig deeper and fix it to ensure you’re not under attack.

Learn and share knowledge. Understanding this issue is key to keeping your network safe. Explain to your employees what DNS hijacking is, why it’s a problem, and how to spot if the network might be compromised. When people know what to look out for, they can help stop these attacks before they do harm.

Think about DNS filtering. These services stop your network from connecting to websites that are known to be harmful. They can also block attempts to contact servers that spread malware. Adding DNS filtering to your security plan is a good way to keep out threats that could lead to DNS hijacking. 

Beef up your network security. Using firewalls and following best practices for network security build a strong defense against unauthorized entries and various cyber threats, including DNS hijacking. These actions add extra layers of protection, which makes it harder for attackers to break into your network or carry out harmful activities.

Customize your DNS settings. Instead of sticking with your Internet Service Provider’s DNS, switch to custom DNS servers known for being secure. This gives you more control and reduces hijacking risks. 

How NordLayer can help

NordLayer steps in to help your company stay safe online with its DNS filtering service. This tool stops access to malicious websites and screens out content that might be harmful or distracting for your team.

Managers can set rules on what’s not allowed on the company’s networks. It acts like a shield, keeping team members safe from phishing and other harmful online stuff. This way, everyone can focus on their work without worrying about online threats.

Using NordLayer’s DNS filtering is easy and effective. Whenever someone tries to visit a website, NordLayer checks it against a list of safe and approved sites. If it finds a website that’s unsafe or on a blocklist, it won’t let the site load.

This step is great for stopping online threats before they can do any harm. Plus, NordLayer has a feature called ThreatBlock, which finds and blocks dangerous domains by pulling information from many places. Along with keeping your internet traffic safe with strong encryption and the ability to filter out more than 50 types of not-so-great content, NordLayer gives you a powerful way to keep your organization’s online space secure and productive. No matter the size of your team, NordLayer is ready to help you manage and protect your remote workers in a simple and effective way. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation

What is Parallels Browser Isolation (PBI)? 

Parallels Browser Isolation (PBI) is a comprehensive, cloud-native solution that offers highly secure access to web applications and SaaS via a preferred web browser. It is a remote browser isolation solution that offers Zero Trust protection from cybersecurity threats and aligns with industry security standards for safety, protection, and compliance.

Parallels Browser Isolation is a fully hosted remote browser isolation service, with a control plane and containerized browser instances. It’s scalable, flexible, and agentless, offering a highly adaptable and secure solution for all users within an organization.

Learn more about Parallels Browser Isolation!

Why would you like to set up secure access to Microsoft Azure with Parallels Browser Isolation (PBI)?

Like many SaaS applications, users have access to Microsoft Azure from any device and any location by default.

Conditional access in Microsoft Entra Identity (Azure AD) enables you to impose restrictions on managed devices or specific network ranges. However, it’s important to understand that these restrictions are applicable only to managed devices.

What if you want to enforce restrictions without the use of VPN agents? Or suppose you aim to apply access controls to bring-your-own-device (BYOD) policies or non-windows-based devices?

Adding to these challenges, it’s crucial to note that conditional access focuses solely on securing entry points. It does not extend to controlling actions within Microsoft Azure (or any other SaaS application) once access is granted.

What if your security needs include stopping users from downloading data while permitting uploads? Or suppose you need to disable copy/paste functions, prevent screenshot capture, and block printing capabilities? These requirements align with a Zero Trust security model, yet such specific restrictions cannot be achieved through traditional conditional access or role-based access controls alone.

Parallels Browser Isolation enables you to route all Microsoft Azure access through a remote browser. This setup allows for geo-blocking, restricting access exclusively to locations associated with PBI IP addresses.

Following this configuration, only users who adhere to the PBI policies and belong to the designated access groups will be granted the ability to connect to Azure. Furthermore, the policy engine empowers you to specify permissible actions within Azure, such as copy/paste, upload, download, print, and others, offering a tailored and secure user experience.

PBI Azure Portal Diagram

Implement conditional access on Azure

For the first step, you must set up Microsoft Azure to exclusively permit access from PBI IP addresses. You can do this by setting up conditional access within Microsoft Entra ID (formerly known as Azure AD). It’s important to highlight that activating this conditional access feature requires a Microsoft Entra Identity P1 license. The process starts with establishing a Named Location that encompasses the IP addresses associated with Parallels Browser Isolation.

As an admin, go to “Microsoft Entra ID” —> “Security,” —> “Named Locations” Click on “+ IP ranges location” and give this location a unique name. In my case, I called this location “Parallels Browser Isolation”. Add all IP addresses used by Parallels Browser Isolation. The list can be found online in this KB article: https://kb.parallels.com/en/130095.

When adding the different IP addresses, add a /32 to the end to identify that these are single IPs and not ranges.

Once this is done, go to “Microsoft Entra ID” —> “Security” —>“Conditional Access”

Click on “+ Create new policy” and give it a unique name. In my case, I called it “PBI Only Policy”.

In configuring the policy, the initial step involves selecting the ‘Users’ to whom the policy will apply. It’s advisable to begin with a small user group for testing purposes before expanding the policy to include a broader audience.

Important: Make sure you exclude at least a few users from this policy, as you might need to get back into your Microsoft Azure if there are configuration or other issues with your conditional access configuration. If you include everyone and you have an issue, you can’t log in to Microsoft Azure anymore and, therefore can’t make any changes to the conditional access settings in the “Microsoft Entra ID”.

Next, we need to select the “Target Resources” and select “Include”.

If you want to protect your Azure portal only, then choose the “Select apps” option and “Select” only “Microsoft Admin Portals”. This application covers access to Microsoft Azure and some other management portals.

Important: If you choose the “All cloud apps” option, take into account that you might have configured your Parallels Browser Isolation (PBI) solution to be federated with “Microsoft Entra ID,” and therefore, you need to make sure you exclude the application that was created in “Microsoft Entra ID” for PBI from this policy. If not, you won’t be able to log in on PBI.

On the “Conditions” settings, we now have to enable the “Locations” filter. We want to have this policy enabled for all locations except for the “Parallels Browser Isolation” location created in the first step of this procedure.

To do this, under “Include”, select “Any Network,” and under “Exclude,” select “Select Locations” and select the “Named Location” you created earlier, in my case, “Parallels Browser Isolation” location.

The other conditions like “User risk”, “Sign-in risk”, “Device platforms”, “Client apps,” and “Filter for devices” can remain in the default configuration and don’t need to be modified.

The final steps are to set the “Access Controls” to “Block access”, set “Enable policy” to “On,” and save it.

Publish Microsoft Azure as a Secure Web Application in Parallels Browser Isolation (PBI)

Now that the conditional access is configured, your next step is to make sure the users can access Microsoft Azure via Parallels Browser Isolation (PBI).

To do this, log in and go to the PBI admin portal. Click on “Applications” —> “Add Application” —> “Secure Web Application”.

Start by setting the “Name“and the “Icon”. Set “https://portal.azure.com” as a start URL.

Under “Domains,” you have now to specify all URLs that are used by Azure.

For some SaaS applications, this is a single domain, but for Microsoft Azure, the list is pretty long (this is the full list of all domain names used by Microsoft Azure).

You can add the individual subdomains or only the main domains. In the example below we simplified the list of domains to include only the main domains, but not the individual subdomains. Also, we added all possible domains, not just the ones linked to the Microsoft Azure login but all the individual services.

The following domains have been added:

aadrm.com

azconfig.io

azure.com

azure.net

azureedge.net azuresynapse.net loganalytics.io

login.live.com microsoft.com

microsoftonline-p.com microsoftonline.com

msauth.net

msauthimages.net

msftauth.net

msftauthimages.net

office.com

status.microsoft

trafficmanager.net

windows.net

Under the “Access for secure web applications,” select the users or groups in PBI that must have access to Microsoft Azure. Optionally, select an extra policy you want to apply to this application. If the policy doesn’t exist yet, you must first save the application, create a new policy, and then edit the app and assign the newly created policy.

Before creating the policy, don’t forget to save the configuration. You do this by clicking on the bottom of the screen on “Add”.

Once that is done you will see the app in the list of published apps.

Azure Portal PBI

In this example, I want extra security on top of Microsoft Azure and, therefore, will create an extra policy to block “copy/paste”, “download”, and “printing” and have a watermark on the screen to make it more difficult to take screenshots.

To create a new policy in the right menu bar, click on “Policies” —>“Add”

Again, we start with setting a “Name”. My policy will be called “Microsoft Apps Policy”, and the idea is that I can apply this same policy to other published Microsoft applications I may want to publish in PBI later.

I want to apply the policy to all users, so I will set the filter for “Users and Groups” to disabled.

Same for the “Active Hours”, I keep it set to disabled.

For the “Location,” I can implement the geo-restriction. As we have restricted access to Azure to only PBIIP addresses with conditional access, we can’t set country-based geo-restrictions at that level.

In my example, I have geo-restricted Microsoft Azure access to “Belgium”, “France”, “Germany”, “Italy”, “Netherlands”, “Portugal” and “Spain”.

On the “Security controls/Policy Features,” I enabled the “Disable printing”, “Disabled downloads,” and “Disable Clipboard” features.

Under “Security controls/End-user experience,” I enabled the following features:

  • Blue border”: This will put a visual indication (blue border around the screen) that you are not accessing the website directly but via the Parallels Browser Isolation solution.
  • Watermarking”: This will add the user’s login name and date as a watermark on top of the screen so that taking screenshots becomes more difficult.

The “Restrict URLs” options don’t need to change here — they can stay on the default values.

Finish creating the policy by clicking on “Save”. Now that the policy has been created, go back to the “Azure Portal” application and add the “Microsoft Apps Policy” to the application.

Test the setup

Now that we have published the “Azure Portal” application on PBI and configured the conditional access on Microsoft Entra ID, we can test if the setup works: First, we try to open it directly from the web browser.

This should not work as the conditional access only allows connections from the Parallels Brower Isolation IP addresses.

PBI Secure Access

If we do the same thing but via Parallels Browser Isolation, it works. Also, note the watermark and the blue bar around the screen.

Now you have set up secure access to Microsoft Azure via Parallels Browser Isolation!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

24.2.1 Mimas released

Changes compared to 24.2.0

Bug Fixes

  • Fixed an issue with the Comet Server web interface failing to display the users page
  • Fixed an issue applying language selections in the Comet Server web interface

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×