Skip to content

DNS Threats: Vulnerabilities, Attacks, and Prevention Strategies

The Domain Name System (DNS) is crucial for internet functionality, acting as an address book that maps web addresses to their numerical IP addresses. However, DNS is also a vector for various cyber threats due to its foundational role in network communications. Malware, ransomware, phishing, and more sophisticated forms of cyberattacks like Domain Generation Algorithms (DGA) and DNS tunneling exploit DNS to infiltrate and damage systems.

142.250.189.206 – google.com 

DNS security is an underrated risk. The technology is structured in a way that allows DNS packets to flow through the network without prior scrutiny. Moreover, DNS activity within networks is rarely monitored, creating a blind spot in cybersecurity. This oversight is significant, as 88% of companies suffer from DNS attacks every year, according to a 2023 report by EfficientIP. Despite the high risk, one-third of these attacks could be prevented at the DNS level, as highlighted by a 2023 study by Cisco.

What is inside DNS traffic

DNS traffic can carry a variety of parameters that play an important role in the exchange of information between clients and DNS servers. These parameters may include the type of request, the server’s response code, TTL (time to live of the record in the cache), transaction identifier, query options, etc. DNS queries are essential components of DNS traffic, involving requests made by clients to DNS servers to resolve domain names into IP addresses.

Moreover, DNS traffic can carry data about the IP addresses of DNS servers, information about network traffic, the location and configuration of domains, as well as much more that helps ensure the efficient operation of the Internet and its security. The DNS resolver plays a crucial role in processing these DNS queries, facilitating the exchange of information between clients and DNS servers. Here is a list of the main parameters:

Threats at the DNS level

Malware

Malicious software, or malware, includes various cyber threats such as viruses, trojans, spyware, adware, and techniques like DNS cache poisoning, where malware redirects users to malicious sites by exploiting DNS vulnerabilities. It can cause significant issues, from minor annoyances to major financial losses, by altering browser settings, using up computing resources, and collecting sensitive user data like passwords and credit card numbers.

DNS protection is crucial in combating malware by:

  • Blocking access to malicious domains to prevent malware communication and data breaches.
  • Monitoring for abnormal behavior to detect malware presence.
  • Providing network activity logs to enhance incident response and mitigate security breaches quickly.

Ransomware

Ransomware is malicious software that encrypts a computer’s files, rendering them inaccessible, and may lead to data breaches. The malware demands ransom for decryption, impacting both individuals and business operations.

DNS protection aids against ransomware by:

  • Blocking access to ransomware’s command and control servers to disrupt its communication.
  • Preventing devices from connecting to malicious websites and email attachments that could initiate an attack.
  • Enabling rapid, automated threat detection and alerts, facilitating a swift response to potential ransomware activity.

Phishing and Typosquatting

Phishing and Typosquatting are forms of cyber deception aimed at stealing sensitive information through fake websites and misspelled domain names. DNS spoofing is another method where attackers manipulate DNS records to redirect users to fraudulent sites, often for malicious purposes such as phishing, malware distribution, or denial-of-service attacks. These practices can compromise personal and corporate security, leading to financial losses and reputational damage.

DNS protection helps combat these threats by:

  • Preventing access to fake websites designed to mimic legitimate ones, safeguarding user credentials.
  • Utilizing algorithms to identify and block deceitful domains that resemble legitimate sites, protecting users from fraud.

Botnet, Cryptojacking, and C2C

Botnets, composed of internet-connected devices infected with malware, can perform various malicious activities, including DDoS attacks, data theft, and illegal cryptocurrency mining, leading to energy and productivity loss and potential financial and reputational damages. Botnets and C&C servers often utilize DNS requests to communicate and control compromised devices, highlighting the need for robust DNS protection strategies.

DNS protection helps by:

  • Blocking access to known command and control (C&C) servers to disrupt botnet communications.
  • Detecting and preventing connections to suspicious domains associated with botnets or C&C servers.
  • Identifying unusual patterns that may indicate botnet presence to prevent system infections.

Parked Domains

These are domain registrations on DNS servers offering parking services, not actively used but may host illegitimate content at a remote server at any time. SafeDNS implements a verification pipeline using real-time data from various sources to monitor new domains and their content, identifying and filtering out illegitimate resources at an early stage. The system establishes domain-IP-autonomous system (AS) relationships, which helps in the early detection of malicious domains.

DGA and DNS Tunneling Attacks

DGAs create numerous domain lists to maintain botnet communication and evade security measures. They don’t directly harm networks but enable the infiltration of malicious software and impede its removal, potentially resulting in corporate network damage.

DNS protection contributes by:

  • Detecting and blocking DGA-generated domains using machine learning and traffic analysis, ensuring queries are directed to the correct IP address by verifying information with the authoritative DNS server.
  • Monitoring and obstructing abnormal DNS activity that could signify DNS tunneling.
  • Maintaining a database of known DNS tunnels to block unauthorized connections and data transmission.

An authoritative DNS server plays a crucial role in this process by holding the official and up-to-date information about a domain name’s IP address, ensuring that DNS queries are resolved with the correct IP address, which is essential for preventing DNS tunneling and DGA threats.

Threats at the DNS level are a major concern because they can disrupt operations, compromise sensitive data, and damage reputations. However, with the right solutions in place, many of these threats are preventable. SafeDNS is at the forefront of this defense, leveraging the latest advances in AI and machine learning to effectively detect and mitigate threats.

By processing billions of queries every day, SafeDNS provides real-time monitoring and proactive measures to secure networks. The power of SafeDNS lies in its extensive categorization database of over 2 billion URL records, providing unparalleled protection. This comprehensive approach ensures that SafeDNS not only identifies existing threats, but also anticipates emerging ones, providing a robust shield against DNS-level threats. With SafeDNS, organizations can secure their online presence and ensure the continuity and integrity of their digital assets.

 

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

How to find Rockwell Automation devices

Latest Rockwell Automation vulnerabilities #

Rockwell Automation has disclosed a vulnerability in their ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR products.

CVE-2024-3493 is rated high with CVSS score of 8.6 involves a specific malformed fragmented packet type which can cause a major nonrecoverable fault (MNRF) in Rockwell Automation’s ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it.

What is the impact? #

Successful exploitation of these vulnerabilities result in devices becoming inaccessible remotely and crashing and then require manual intervention to restart them.

Are updates or workarounds available? #

Rockwell Automation has provided software updates for the impacted versions.

Affected ProductFirst Known in Firmware RevisionCorrected in Firmware Revision
ControlLogix® 5580V35.011V35.013, V36.011
GuardLogix 5580V35.011V35.013, V36.011
CompactLogix 5380V35.011V35.013, V36.011
1756-EN4TRV5.001V6.001

How do I find potentially vulnerable systems with runZero? #

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

hw:"1756-EN4TR"

Rockwell Automation PowerFlex 527 vulnerabilities (March 2024) #

In March 2024, Rockwell Automation disclosed multiple vulnerabilities in their PowerFlex 527 product.

CVE-2024-2425 and CVE-2024-2426 are both rated high with CVSS score of 7.5 and both involve improper input validation which could cause a web server to crash and CIP communication disruption, respectively, which leads to requiring manual restarts.

CVE-2024-2427 is rated high with CVSS score of 7.5 and indicates a denial-of-service scenario due to improper network packet throttling which causes a device to crash and require a manual restart.

What was the impact? #

Successful exploitation of these vulnerabilities result in devices becoming inaccessible remotely and crashing and then require manual intervention to restart them.

Are updates or workarounds available? #

Rockwell Automation does not currently have a fix for these vulnerabilities. Users of the affected software are encouraged to apply risk mitigations and security best practices, where possible.

Users should disable the web server if it is not needed, which should be disabled by default. Additionally, users should ensure these devices are isolated in their own networks to prevent unwanted packets flooding the device.

How do I find potentially vulnerable systems with runZero? #

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

hw.product:"powerflex"

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Preparing for UEFI bootkits. ESET discovery shows the importance of cyber intelligence

Roman Cuprik

Some threats bypass standard security tools. In such cases, security operators capable of deep analysis are needed. 

Last year, ESET Research confirmed rumors concerning BlackLotus, the first publicly known UEFI bootkit capable of bypassing a UEFI Secure Boot, being sold on underground forums. This means that malware preying upon fundamental weaknesses in the UEFI security model is in-the-wild and experts are expecting more bootkits like BlackLotus in the near future.

“Bootkits are no longer just a threat to legacy systems, but a real threat to the majority of modern UEFI firmware systems,” said ESET Researcher Martin Smolár, who discovered this previously undocumented real-world UEFI bootkit and presented his finding at the 2024 RSA conference.

This threat creates a challenge for businesses: How to take a prevention-first approach and secure their devices against attacks that cannot be fully prevented simply by following the standard recommendations and using default system settings because there are known vulnerabilities that still haven’t been fixed and might never be fixed?

Despite businesses holding the short end of the stick right now, they are not without hope. In fact, these are the situations where cyber intelligence platforms such as ESET Threat Intelligence shine.

Confirmed myth

In a nutshell, UEFI bootkits are serious threats targeting Windows that gain full control over the operating system (OS) boot process. With this level of capability, they can disable various OS security mechanisms and are able to operate very stealthily and with high privileges.

The initial attack vector is unknown, but UEFI bootkit starts with the execution of an installer deploying the bootkit’s files to the EFI  System Partition. This abbreviation stands for Extensible Firmware Interface System Partition, which stores files needed for booting operating systems.

Using this installer, attackers can disable the first two layers of defense: Hypervisor-protected Code Integrity (HVCI) and BitLocker encryption. Then they reboot the host.

After the first reboot, the malware abuses the known vulnerability CVE-2022-21894, allowing attackers to enroll their own Machine Owner Key (MOK). An MOK allows owners of devices running non-Windows OSes to generate keys that sign non-Microsoft components during the boot process, thus allowing only approved OS components and drivers to run. By abusing this boot security feature, attackers achieve persistence.

The computer now thinks that the system is booted using trusted software, which means that attackers have bypassed another layer of protection, UEFI Secure Boot, and the machine is then again rebooted.

In the next stages, the self-signed UEFI bootkit is executed and deploys the kernel driver, having access to the Kernel, a computer program at the core of a computer’s operating system, which generally has complete control over everything in the system. It also deploys a user-mode HTTP downloader responsible for communication with the C&C. The abused device can now receive and execute commands from C&C and download additional user-mode or kernel-mode payloads.

Businesses are not powerless

Looking at this cascade for the hijacking of a compromised computer, and knowing that there is no effective fix for older devices due to their outdated security mechanisms, one may feel as if their hands are tied.

But businesses can protect themselves and apply a prevention-first approach even in these cases.

  • First of all, businesses need to keep their system and security products up to date, decreasing options for attackers.
  • IT staff should learn possible risks and procedures concerning how to decrease them. Microsoft released a threat description and a guidance for investigating UEFI attacks.
  • If needed, set up a custom secure boot policy. This, however, requires an experienced admin and is manageable only with a handful of devices due to its complexity.
  • Deploy reliable monitoring solutions and configure their integrity-scanning tools to monitor the composition of the EFI boot partition.
  • Block any attempts of modifying all or specific files on EFI System partition by untrusted processes to prevent bootkits installation.
  • Track developments with UEFI malware across Threat Intelligence platforms and resources.

ESET solutions such as ESET Enterprise Inspector and ESET UEFI Scanner, which is part of the ESET Host-based Intrusion Prevention System (HIPS), can detect signs that something suspicious is happening with a device and alert IT admins. While ESET UEFI Scanner checks and enforces the security of the pre-boot environment, HIPS combines advanced behavioral analysis with the detection capabilities of network filtering to monitor running processes, files, and registry keys.

For more information, check the RSA presentation by ESET Researcher Martin Smolár, via the ESET research podcast, and the NSA BlackLotus Mitigation Guide.

Be one step ahead of threat actors

Since the discovery of the in-the-wild UEFI bootkit, Microsoft has released several patches, and experts across the world provided some guidance. But how to protect a business from the start, before all of this can happen?

To identify such new threats and customize their solutions to deal with them, global leaders in cybersecurity such as ESET invest a lot in research. ESET Threat Intelligence turns this effort into a service, providing businesses with curated global knowledge about threat actors’ activities, gathered by ESET analysts and experts.

Thanks to ESET Threat Intelligence, security engineers, analysts, or incident responders can learn about new threats ASAP, anticipating them and making better, faster decisions. This allows them to deploy a proactive defense, customize their security, and fight increasingly sophisticated cyberattacks.

Moreover, ESET APT Reports give businesses access to private, in-depth technical analysis together with threat mitigation tips. Every user with the APT Reports PREMIUM package will also have access to an ESET analyst for up to four hours each month. This provides the opportunity to discuss topics in greater detail and help resolve any outstanding issues.

Facing a challenge

UEFI Bootkits represent a challenge that is hard to tackle, however that is why it is so important for businesses and enterprises to have reliable cyber intelligence.

With a globally distributed network of security centers, ESET research labs never sleep and have immediate access to threat intelligence like no one else, thanks to the number and distribution of devices protected around the world. Combined with more than three decades of experience in cybersecurity research and product development, ESET can provide businesses with vital intel and use this knowledge to continuously innovate threat-defense techniques.    

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×