iTnews

US govt orders security measures for DNS hijack emergency

By Juha Saarinen on Jan 23, 2019 10:39AM
US govt orders security measures for DNS hijack emergency

Iran blamed for "almost unprecedented scale" attacks compromising web and email traffic.

The United States Department of Homeland Security has issued an emergency directive in response to a serious, global campaign of domain name system (DNS) infrastructure tampering, believed to originate in Iran.

Earlier in January, security vendors Cisco Talos and Mandiant FireEye outlined a spate of DNS hijacks against multiple government, telcos and internet infrastructure organisations in Europe, North America and the Middle East/Africa. 

Attackers have successfully redirected web and email traffic by altering DNS records, making them point to servers on addresses that they control.

They've been able to do so by capturing administrative credentials for administrative accounts that can make changes to DNS records. FireEye and Talos said they have received reports that sophisticated phishing attacks were used to gain acccess for DNS record manipulation, as well as compromising a victim's domain registrar account.

Once attackers have changed DNS records, they've also been able to obtain valid digital encryption certificates for an organisation's domains. This allows attackers to decrypt user data undetected.

FireEye and Talos said its initial research suggests the actors responsible for the attacks that have taken place over a year "have a nexus to Iran".

Federal agencies are now required to take action as per the DHS directive to mitigate against the DNS attacks.

Within ten business days US federal agencies with .gov and other domains must audit publci DNS records to verify that they point to the correct, intended location. If they do not, agencies must report it to the Cybersecurity and Infrastructure Security Agency (CISA).

To prevent future unauthorised DNS account accesses, agencies must change passwords on these and add multi-factor authentication.

CISA's Cyber Hygiene service will also begin a regular delivery of newly added certificates to Certificate Transparency log for US federal agency domains.

Agencies are required to immediately start monitoring CT log data for certificates that they did not request. If any unauthorised certificates are found, they must be reported to the issuing certificate authority and the CISA.

The Australian Cyber Security Centre issued an advisory yesterday recommending that administrators review the FireEye and Cisco Talos blogs for information on how to harden their organisations' DNS infrastructure.

ACSC head Alastair MacGibbon also encouraged administrators to follow the agency's Essential Eight mitigation strategies to better safeguard their systems.

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
cisco dns fireeye iran mandiant security talos telco/isp united states

Partner Content

COVID puts agile IT under the microscope
Promoted Content COVID puts agile IT under the microscope
Shut the door on ransomware
Promoted Content Shut the door on ransomware
Putting cyber security basics in place
Partner Content Putting cyber security basics in place
Four data superpowers to harness before 2022
Promoted Content Four data superpowers to harness before 2022

Sponsored Whitepapers

Encryption: Protect your most critical data
Encryption: Protect your most critical data
Overcoming data security challenges in a hybrid, multicloud world
Overcoming data security challenges in a hybrid, multicloud world
Move beyond passwords
Move beyond passwords
The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Juha Saarinen
Jan 23 2019
10:39AM
0 Comments

Related Articles

  • 'Massive messaging storm' takes out Telstra's DNS infrastructure
  • SolarWinds, Microsoft, FireEye, CrowdStrike defend actions in major hack
  • SolarWinds, Microsoft, FireEye, CrowdStrike executives face US Senate grilling
  • Twitter reveals purges of state-sponsored threat actors
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.