Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New Domain Poisoning Attacks Microsoft Servers
TechWeb ^ | April 6, 2005 | Gregg Keizer

Posted on 04/06/2005 3:35:31 PM PDT by Eagle9

The DNS cache poisoning that first struck more than a month ago and led to users being redirected from popular Web sites to malicious sites that infected their machines with spyware, is continuing, said the Internet Storm Center (ISC) Wednesday. The attacks are taking advantage of vulnerabilities and design flaws in Microsoft server software.

DNS cache poisoning occurs when an attacker hacks into a domain name server, one of the machines that translate URLs such as www.techweb.com into the appropriate IP address. The attacker then "poisons" the server by planting counterfeit data in the cache of the name server. When a user requests, say, techweb.com, and the IP address is resolved by the hacked domain server, the bogus data is fed back to the browser and the user is directed to another Web site, not the intended destination.

To highlight the danger, the ISC raised its Homeland Security-esque alert color code from Green to Yellow. According to ISC, Yellow represents that "we are currently tracking a significant new threat. The impact is either unknown expected to be minor to the infrastructure. However, local impact would be significant."

To set the DNS cache poisoning threat in perspective, Yellow is the same alert color code that ISC used during the SQL Slammer, MSBlast, and Sasser worm outbreaks, three of the nastiest in the last two years.

The newest attack, said Kyle Haugsness, one of the ISC analysts, is actually the third since March 4. Like the initial attack, the motivation is certainly money, since the result is again the installation of mass quantities of spyware on victims' PCs.

"The motivation for these attacks is very simple: money," Haugsness said. "The end goal of the first attack was to install spyware/adware on as many Windows machines as possible."

The second attack, he continued, "seems to have been launched by a known spammer," said Haugsness. That second attack, which took place starting March 24, redirected users from legit sites to sites selling prescription drugs.

Initially, Haugsness and the other ISC analysts thought that a DNS cache poisoning attack was beyond the skills of most spammers -- and so might be proof that the original attackers were contracting their services, but now he said "they might be completely unrelated. In fact, one of the things we discovered after looking into these attacks is just how easy they are to carry off."

The third, and still-ongoing attack, which began March 25, has the same goal -- install spyware -- as the first, said Haugsness. One of the DNS servers involved in the early-March attack wasn't cleaned up properly, and the attacker returned and changed the poisoning tool.

"Right now this is still going on," said Haugsness. "The attackers are changing IP addresses around and poisoning other DNS servers [to stay ahead of security authorities]."

Among the domains included in one of the poisoned DNS servers during the first attack were major sites such as americanexpress.com, cnn.com, redhat.com, and msn.com. "These [665] domains organizations did not have their DNS cache's poisonedthese organizations were not compromised, although it is possible that customers of these sites unknowingly gave out login information or personal information to the malicious servers," wrote Haugsness in a long report posted on the ISC site about the attacks.

Although there's essentially nothing an end-user can do to protect him- or herself -- other than to regularly sweep the system for spyware and/or have real-time anti-spyware defenses up and running -- DNS server administrators, particularly those in enterprises, should scramble.

Windows-based DNS servers are particularly vulnerable, since Windows NT Server 4.0 and Windows 2000 Server prior to SP3 are insecure against DNS cache poisoning attacks. Windows 2000 Server SP3 and later, as well as Windows Server 2003, are configured securely by default. (For more information, see this Microsoft Knowledgebase article.)

Other users that are vulnerable are those running various Symantec gateway security products who haven't patched bugs the Cupertino, Calif.-based vendor released in mid-March.

But the entire Windows server software platform -- including properly configured NT/2000 and 2003 systems -- seems to have an architectural design flaw, said Haugsness, that makes them vulnerable to cache poisoning attacks. He said ISC was working with Microsoft to pin down the exact cause.

"This is a lot easier to do than we thought," said Haugsness, who noted that cache poisoning isn't new. "That's the main reason we went out there with this, and bumped up to Yellow.

"What's scarier is that this could be used in lot more subtle fashion, to make it difficult, or even impossible to detect."


TOPICS: Technical
KEYWORDS: dns; microsoft; phishing; security; server
Navigation: use the links below to view more comments.
first 1-2021-4041-59 next last
Although there's essentially nothing an end-user can do to protect him- or herself -- other than to regularly sweep the system for spyware and/or have real-time anti-spyware defenses up and running -- DNS server administrators, particularly those in enterprises, should scramble.

I run anti-spyware programs once a week.

1 posted on 04/06/2005 3:35:48 PM PDT by Eagle9
[ Post Reply | Private Reply | View Replies]

To: Eagle9
I run anti-spyware programs once a week.

Good, but this attack is perfect for phishing. Even if you're paranoid and manually type in http://paypal.com, if the attacker has gotten to the DNS server you're using you'll still get sent to the fake site.

2 posted on 04/06/2005 3:42:01 PM PDT by ThinkDifferent (These pretzels are making me thirsty)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Tech ping.


3 posted on 04/06/2005 3:42:55 PM PDT by Eagle9
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9

Actually, there are several things you can do.

You could run a local DNS caching server on you home network, for example. It's pretty easy to set one up in Linux, BSD, or Solaris.

Or you could just configure you TCP/IP connection to use a DNS server known to be reliable. The OpenRoot Foundation's DNS servers are quite good, and they invite everyone to use them:

http://support.open-rsc.org/


4 posted on 04/06/2005 3:46:18 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9

This thing keeps moving my home page from google to some searchnet crap and it keeps putting crap in my favorites. We have anti-spyware up and running but everytime I start up my computer it gets high-jacked. Any clue as to how to get rid of this?


5 posted on 04/06/2005 3:47:08 PM PDT by Slyfox
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9
The impact is either unknown expected to be minor to the infrastructure.

Who proof reads this stuff?

6 posted on 04/06/2005 3:47:22 PM PDT by scab4faa (http://www.compfused.com/directlink/703/)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9

Those whose ISPs are smart and thus running Linux should not see any issues at all.


7 posted on 04/06/2005 3:47:50 PM PDT by ikka
[ Post Reply | Private Reply | To 1 | View Replies]

To: Eagle9
Domain Poisoning

Not to be confused with ptomaine poisoning...

8 posted on 04/06/2005 3:50:22 PM PDT by sourcery (Resistance is futile: We are the Blog)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ThinkDifferent

Exactly.


9 posted on 04/06/2005 3:50:42 PM PDT by Texas_Jarhead (http://www.freerepublic.com/focus/news/1366853/)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Slyfox; backhoe
This thing keeps moving my home page from google to some searchnet crap and it keeps putting crap in my favorites. We have anti-spyware up and running but everytime I start up my computer it gets high-jacked. Any clue as to how to get rid of this?

Have you ran HijackThis! yet?

10 posted on 04/06/2005 3:51:17 PM PDT by Eagle9
[ Post Reply | Private Reply | To 5 | View Replies]

To: Slyfox

If you are running XP, make sure you have rollback turned OFF. That is one reason why I do not allow my company to use XP. Its features can be used against it. Windows 2000 here.


11 posted on 04/06/2005 3:53:27 PM PDT by sittnick (There's no salvation in politics.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Slyfox
Yes. You've been hijacked. If you're running Windows XP then you're best single point of interest is Microsoft's Anti-Spyware program (beta). You can download it form the downloads section of their website. If you have a different operating system then you will probably need to run multiple anti-spyware programs in order to get things cleared up.
12 posted on 04/06/2005 3:53:45 PM PDT by Texas_Jarhead (http://www.freerepublic.com/focus/news/1366853/)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Slyfox

i've had really good luck with this new cleaner - free -

http://www.download.com/1200-2018-5139934.html

and also www.antivirus.com has a new free scanning tool that detects viruses, trojans and spyware -

look for the beta version, 'housecall'

http://housecall.trendmicro.com/


13 posted on 04/06/2005 3:54:30 PM PDT by bitt (Go sell crazy somewhere else. We're all stocked up here.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Eagle9

I just lost my computer to these evil bast*ards. I ended up hijacked to about.com. As I began running spyware, adware, & malware programs to clean the machine (one program alone found over 189 pieces of malicious programs & registry entries!) my computer became more & more unstable. At one point, the video began to flash (like it was trying to refesh itself) which prevented me from navigating by mouse. I finally found, quarantined, & deleted a program called "lexplore" which is the Sodabot virus. This gave me back SOME functionality, but most of my Microsoft programs had been uninstalled or disabled. Control Panel, for instance, was gone completely. I can't say for a certainty how my machine was infected, but I don't think it's a coincidence that I had just finished downloading Windows & Explorer updates. I am thus assuming that the Microsoft server was compromised.

Computer is now with my Geek getting a fresh install of everything right down to the OS & that's going to cost me, bigtime. Why is it that we can't go after the companies who benefit from hijacking through class action lawsuits or even under the RICO laws of the U.S.? I understand having no recourse for companies licensed & located outside the U.S., but there's a lot of U.S. companies that obviously stand to benefit from this malicious invasion. One would have to be a complete idiot to believe that sites like about.com aren't complicit in these attacks.


14 posted on 04/06/2005 4:06:12 PM PDT by torqemada ("Nobody expects the Spanish Inquisition!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Slyfox

check out my tale of woe on Post 14 & take some advice...don't even try to fix it yourself. I spent something like 20 hours running scan & fix-it programs of every stripe. Very cleverly, there's some sort of code that will eventually try to protect the offender by disabling your ability to remove programs or access your registry to delete bogus entries.


15 posted on 04/06/2005 4:12:27 PM PDT by torqemada ("Nobody expects the Spanish Inquisition!")
[ Post Reply | Private Reply | To 5 | View Replies]

To: torqemada
I absolutely HATE about.com.
16 posted on 04/06/2005 4:17:18 PM PDT by Slyfox
[ Post Reply | Private Reply | To 14 | View Replies]

To: torqemada; bitt; Texas_Jarhead; sittnick

I have printed out all your info and will let my son go through it all. I really appreciate this whole posting and each one of your inputs. :)


17 posted on 04/06/2005 4:20:59 PM PDT by Slyfox
[ Post Reply | Private Reply | To 15 | View Replies]

To: Slyfox
...Any clue as to how to get rid of this? ...

Format C:

18 posted on 04/06/2005 4:30:51 PM PDT by FReepaholic (Vote for Pedro)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Slyfox

Throw your computer out the window and buy a Mac!


19 posted on 04/06/2005 4:32:35 PM PDT by Wacka
[ Post Reply | Private Reply | To 5 | View Replies]

To: torqemada
...Very cleverly, there's some sort of code that will eventually try to protect the offender by disabling your ability to remove programs or access your registry to delete bogus entries. ...

Boot into Safe Mode and then run your anti-spyware tools.

Booting into Safe Mode only loads necessary processes. You can't remove some spyware while their malicious processes are running. And, you can't kill the processes.

20 posted on 04/06/2005 4:33:17 PM PDT by FReepaholic (Vote for Pedro)
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-59 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson