Security Market Segment LS
Monday, 11 April 2016 15:31

DNS attacks – what the?

By

DNS attacks continue to grow – securing the ‘phone book to the internet’ must be a priority.

I interviewed Jesper Andersen, President, and CEO of Infoblox, an industry leader in DDI - DNS, DHCP, and IP address management.

Andersen, a great Dane, has a master’s degree in computer Science from Aalborg University, Denmark - and originally wanted to be a pilot. The interview is paraphrased to avoid overuse of ‘he said’.

Let’s try to explain DDI and its key components.

DNS is domain name system – a decentralised naming system for computers connected to the Internet.

DHCP is Dynamic Host Configuration Protocol - client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.

IPAM is a way to plan, track, and manage the Internet Protocol (IP) address space used in a network. IPAM integrates DNS and DHCP so that each is aware of changes in the other (for instance DNS knowing the IP address taken by a client via DHCP, and updating itself accordingly).

Ever since the internet was first created, cyber criminals have been looking for ways to exploit it for their own ends. Spam emails, viruses, malware, and distributed denial of service (DDoS) attacks have all been used to both cause disruption and generate illicit profits.

Significant progress has been made on protecting users from such activities; there is one area which is still very much a focus for enterprising cyber criminals: the Domain Name System (DNS).

While other forms of attack have been declining in recent years, DNS-related activities have continued to grow. Industry research has found DNS is now the second most common vector for internet exploits, behind HTTP.  Many banks around the world, for example, have found themselves the target of such activities. Sometimes the attacks have been timed to coincide with efforts to transfer money out of accounts. While specific banks are unwilling to discuss particular details, it’s clear they are taking their DNS security very seriously.  At the same time, DNS attacks will continue to evolve.

There are two key issues that every enterprise is concerned about – security and cloud – and these shine a spotlight on DDI.

DNS has become highest attack vector (along with HTTP – another application level attack vector). It started out with DDoS - how to hurt the business if I flooded your website then you may not be able to service your real customers. But now it is about malware like Cryptolocker using DNS to contact the command and control (C&C) server for further instructions. Or it may just want to join a botnet to start spamming.

DDOS attacks are not as bad as things like the cache poisoning of DNS servers, where threat actors take over a server and redirect users to a spoofed website. Customers will then leave login credentials and credit card details which will be stolen.

We can now block that malware via a DNS firewall – no instructions means limiting the harm it can do.

The bad guys get really smart – they know you will look at DNS – so they now use DNS tunnels (like a VPN so it is private), but you don’t want to allow a tunnel on your network you don’t know about. We now cover that.

There are too many security vendors that say they can do everything. Infoblox is a specialised tool and is very good at what it does. It also plays well with all vendors it – APTs, Threat Intelligence, SIEM, Network access controls, Next-Gen endpoint security. And it uses STIX/TAXII/REST and other third party protocols to help paint a complete security picture.

Another issue is that a lot of companies run fairly old DNS servers or software – cybercriminals are using DNS traffic to send stolen information by encoding it in DNS headers. It is very difficult to detect unless you deploy advanced analytics and machine learning that can identify those patterns.

We can do this because we have the control point in the network that allows IP traffic in and out. Traditionally we run this on premise, but it will run in the cloud if you want. There are more and more cloud and hybrid deployments that need DNS protection.

About a year ago we created a baseline DNS threat index - which measures the creation of malicious Domain Name System (DNS) infrastructure. Infoblox researchers found that 92% of newly observed malicious domains in Q4, 2015 were hosted in either the United States or Germany. Simply this means the number of malicious domains is increasing from quarter to quarter and year to year.

Our findings may indicate we’re entering a new phase of sustained and simultaneous plant/harvest activity. As we see this escalation of efforts by cybercriminals, it is essential we go after the infrastructure that cyber criminals are using to host these domains. So, for the first time, we are using the index to highlight the countries with the most hosting locations for bad domains.

Exploit kits are a particularly alarming category of malware because they represent the automation of cybercrime. A small number of highly skilled hackers can create the kits, which are packages for delivering a malware payload, and then sell or rent these toolkits to ordinary criminals with little technical experience. This can vastly increase the ranks of malicious attackers capable of going after individuals, businesses, schools, and government agencies.

While Angler continues to lead DNS exploit kit activity, RIG—an older kit that has been far back in the pack in usage during previous quarters—surged into second place. Infoblox analysis of RIG activity in 2015 shows that it began using domain shadowing techniques similar to those pioneered by Angler to defeat reputation-based blocking strategies. This indicates that as exploit kits are updated in coming years, there may be a reappearance of past threats in a new guise or location.

We work for larger enterprise and government – there are numerous companies looking after the SME market. But the cloud deployment model and buying threat intelligence as a service is always an option.

About Jesper Andersen

A seasoned networking and software industry executive with a track record of building large businesses, Andersen is responsible for the company's continuing growth and innovation.  Before joining Infoblox in December 2014, he served in some roles at Cisco Systems, including senior vice president for network management.  

After leading the network management group, Andersen was senior vice president and general manager of Cisco’s service provider video business unit. Andersen helped transform the business from a focus on traditional set-top boxes and cable access to the new world of streaming online video. Under Andersen’s leadership, the company acquired NDS, a leading provider of video software solutions, in September 2012.
 
Before Cisco Systems, Andersen was senior vice president of application strategy at Oracle Corporation, a position he also held at PeopleSoft before its acquisition by Oracle. At Oracle, Andersen was responsible for the definition and strategy of the company’s new Fusion applications, as well as the strategy and requirements across Oracle’s other application solutions, including Oracle E-Business Suite, PeopleSoft Applications, JD Edwards, and Siebel Solutions. Under Andersen’s leadership, the company embarked on an application strategy that targeted individual industry verticals, leading to some acquisitions of vertical business solutions.
 
Before Oracle and PeopleSoft, Andersen held various engineering and executive positions at Pivotal Software and Computer Resources International. He also serves on the board of directors of Telx Corporation.

 

 

 

Read 3323 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




Maximising Cloud Efficiency - LUMEN WEBINAR 23 April 2025

According to KPMG, companies typically spend 35% more on cloud than is required to deliver business objectives

The rush to the cloud has led to insufficient oversight, with many organisations struggling to balance the value of cloud agility and innovation against the need for guardrails to control costs.

Join us for an exclusive webinar on Cloud Optimisation.

In this event, the team from Lumen will explain how you can maximise cloud efficiency while reducing cost.

The session will reveal how to implement key steps for effective cloud optimisation.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments