Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

DHS Orders Federal Agencies to Audit DNS Security for Their Domains
The Hacker News ^ | January 23, 2019 | Swati Khandelwal

Posted on 01/23/2019 10:07:56 AM PST by taxcontrol

The U.S. Department of Homeland Security (DHS) has today issued an "emergency directive" to all federal agencies ordering IT staff to audit DNS records for their respective website domains, or other agency-managed domains, within next 10 business days. The emergency security alert came in the wake of a series of recent incidents involving DNS hijacking, which security researchers with "moderate confidence" believe originated from Iran. Domain Name System (DNS) is a key function of the Internet that works as an Internet's directory where your device looks up for the server IP addresses after you enter a human-readable web address (e.g., thehackernews.com).

What is DNS Hijacking Attack?

DNS hijacking involves changing DNS settings of a domain, redirecting victims to an entirely different attacker-controlled server with a fake version of the websites they are trying to visit, often with an objective to steal users' data. "The attacker alters DNS records, like Address (A), Mail Exchanger (MX), or Name Server (NS) records, replacing the legitimate address of a service with an address the attacker controls," the DHS advisory reads. The threat actors have been able to do so by capturing credentials for admin accounts that can make changes to DNS records. Since the attackers obtain valid certificates for the hijacked domain names, having HTTPS enabled will not protect users.

"Because the attacker can set DNS record values, they can also obtain valid encryption certificates for an organization's domain names. This allows the redirected traffic to be decrypted, exposing any user-submitted data," the directive reads. Recent DNS Hijacking Attacks Against Government Websites

Earlier this month, security researchers from Mandiant FireEye reported a series of DNS hijacking incidents against dozens of domains belonging to the government, internet infrastructure, and telecommunications entities across the Middle East and North Africa, Europe and North America. The DHS advisory also states that the "CISA is aware of multiple executive branch agency domains that were impacted by the tampering campaign and has notified the agencies that maintain them." At the end of last year, researchers at Cisco Talos also published a report of a sophisticated malware attack that compromised domain registrar accounts for several Lebanon and the United Arab Emirates (UAE) government and public sector websites.

DHS Orders Federal Agencies to Audit DNS Security for Their Domains

The DHS orders federal agencies to: audit public DNS records and secondary DNS servers for unauthorized edits, update their passwords for all accounts on systems that can be used to tamper DNS records, enable multi-factor authentication to prevent any unauthorized change to their domains, and monitor certificate transparency logs.

For those unaware, Certificate Transparency (CT) is a public service that allows individuals and companies to monitor how many digital certificates have been issued by any certificate authority secretly for their domains.

The Cyber Hygiene service of the DHS's Cybersecurity and Infrastructure Security Agency (CISA) will also begin a regular delivery of newly added certificates to CT log for US federal agency domains. Once the CISA starts distributing these logs, government agencies are required to immediately begin monitoring their CT log data for issued certificates that they did not request. If any agency found any unauthorized certificate, it must be reported to the issuing certificate authority and the CISA. Agencies, except the Department of Defense, the Central Intelligence Agency (CIA) and the Office of the Director of National Intelligence, have 10 days to implement the directives.


TOPICS: Business/Economy; Chit/Chat; Computers/Internet
KEYWORDS: cybersecurity; dhs; dns; hacker; internet
Shout out to all IT / Cyber Freepers. Check your DNS config and admin.
1 posted on 01/23/2019 10:07:56 AM PST by taxcontrol
[ Post Reply | Private Reply | View Replies]

To: dayglored; ShadowAce

p


2 posted on 01/23/2019 10:11:54 AM PST by bitt (forget the electric chair..we're gonna need electric bleachers!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt; taxcontrol; dayglored; ShadowAce

So what the DHS is saying is that they may not be “Master Of Their Domain”? ;-)


3 posted on 01/23/2019 10:15:29 AM PST by an amused spectator (Mitt Romney, Chuck Schumer's p*ssboy)
[ Post Reply | Private Reply | To 2 | View Replies]

To: an amused spectator

A number of years ago, the US Government which controlled an organization called ICANN to an independent organization made up of government agencies and corporations all over the world....I argued at the time that was potentially very damaging.....this article points out some of the problems with the US does not control the DNS system for the internet...

https://www.wired.com/2016/10/internet-finally-belongs-everyone/


4 posted on 01/23/2019 10:29:46 AM PST by srmanuel
[ Post Reply | Private Reply | To 3 | View Replies]

To: taxcontrol

5 posted on 01/23/2019 10:30:19 AM PST by COBOL2Java (Marxism: Trendy theory, wrong species)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; Ernest_at_the_Beach; martin_fierro; ...

6 posted on 01/23/2019 10:33:30 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: an amused spectator
LOL


7 posted on 01/23/2019 10:38:06 AM PST by DannyTN
[ Post Reply | Private Reply | To 3 | View Replies]

To: taxcontrol

FYI...here’s the Emergency Directive 19-01 itself:

https://cyber.dhs.gov/ed/19-01/

Excerpt/summary:

Using the following techniques, attackers have redirected and intercepted web and mail traffic, and could do so for other networked services.

1.The attacker begins by compromising user credentials, or obtaining them through alternate means, of an account that can make changes to DNS records.

2.Next, the attacker alters DNS records, like Address (A), Mail Exchanger (MX), or Name Server (NS) records, replacing the legitimate address of a service with an address the attacker controls. This enables them to direct user traffic to their own infrastructure for manipulation or inspection before passing it on to the legitimate service, should they choose. This creates a risk that persists beyond the period of traffic redirection.

3.Because the attacker can set DNS record values, they can also obtain valid encryption certificates for an organization’s domain names. This allows the redirected traffic to be decrypted, exposing any user-submitted data. Since the certificate is valid for the domain, end users receive no error warnings.


8 posted on 01/24/2019 4:31:51 PM PST by MeganC (There is nothing feminine about feminism.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson