DNS cache poisoning on the rise

Powered by SC Magazine
 

A new threat that poisons DNS caches has been identified.

A new threat that poisons DNS caches has been identified.

David Holman, director of First Cyber Security claimed that the attack came to prominence in July when advice was issued on DNS cache poisoning where users can be tricked into inadvertently giving away personal details on the internet and receive malware infections and email problems.

Holman claimed that every internet user relies on domain name lookup tables, which translate a given domain name into the relevant numeric IP address and with the poisoning of DNS caches, lookup tables are corrupted and the numeric IP addresses of fake web pages are inserted in place of the real addresses for popular sites.

He said: “When a user types in a correct URL they are routed to the false page, instead of the real one. From then on, any details they enter such as usernames and passwords can be captured by third parties and used as part of internet fraud including identity theft.

Solving the problem is not going to be easy for the IT security industry, as conventional IT security systems and software can find it difficult to protect against the problem effectively.

The average computer user is not an IT specialist, and shouldn't need to be to use the internet safely. First Cyber Security provides consumer facing independent web site validation designed specifically to protect against this threat.”

See original article on scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Australia’s banks review the iPhone 6
ANZ, ING Direct and Westpac execs weigh in on NFC, TouchID and big screens.
 
Domain does DevOps
And they’re doing it on .NET.
 
The ethics of security
[Blog post] Where did that zero-day go?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1156

Vote