Eight-year-old “Sitting Ducks” DNS weakness exploited to hijack web domains with impunity
- by nlqip
DNS hacks usually fall into obvious types, such as DNS poisoning (manipulating DNS records to redirect users), domain shadowing (adding malicious sub-domains to a DNS record), or CNAME attacks (hijacking lapsed sub-domains).
Sitting Ducks turned out to be different, and had to do with weaknesses in the way domains are administered, or not administered. In some cases, domains were becoming “lame”.
This happens when the entity registering a domain delegates what is called authoritative DNS to a second provider. For example, a domain is registered legally with one provider, but the DNS resolution itself is handled by a server belonging to a second provider.
Source link
lol
DNS hacks usually fall into obvious types, such as DNS poisoning (manipulating DNS records to redirect users), domain shadowing (adding malicious sub-domains to a DNS record), or CNAME attacks (hijacking lapsed sub-domains). Sitting Ducks turned out to be different, and had to do with weaknesses in the way domains are administered, or not administered. In…
Recent Posts
- Windows 10 KB5046714 update fixes bug preventing app uninstalls
- Eight Key Takeaways From Kyndryl’s First Investor Day
- QNAP pulls buggy QTS firmware causing widespread NAS issues
- N-able Exec: ‘Cybersecurity And Compliance Are A Team Sport’
- Hackers breach US firm over Wi-Fi from Russia in ‘Nearest Neighbor Attack’