How hackers hijack the net`s phone books:Technology
August 19, 2015, 4:35 pm   

Online services that charge to kick people out of games or bombard websites with data have been put out of action by PayPal and security researchers.

The payment firm and the experts worked together to identify the accounts used by so-called "booter" services,

They are thought to carry out hundreds of thousands of attacks each year and charge up to $300 (£200) a month.

Research suggests the action cut the number of active booter services by about 90%.

The booting services use many different ways to batter sites with data but have joined with many other cyber criminals recently in abusing art of the net`s net infrastructure - the Domain Name System (DNS).

This acts like a phone book and translates the website names people use into the numeric equivalents that computers are happy with.

So when you type, DNS translates that into so your browser can find the page.

"DNS underlies everything you do on the internet," said Neil Cook, chief technology officer at security firm Cloudmark.

It is used billions of times a day to make sure you reach the site you are looking for.

Its very usefulness has made it a tempting target for criminally-minded hackers, said Mr Cook, especially because few firms see it as a potential attack vector.

"Most people just see it as plumbing," he said. "They don`t see it as a security hole."

But it is, he said. An attacker that can subvert the DNS system has total control over the data emerging from a company, internet service provider (ISP), home or phone.

Cloudmark was alerted to its potential for trouble by one of it customer, a mobile operator that noticed a massive jump in the amount of data being sent to its DNS servers.

This was odd because the typical DNS query does not involve much data - a simple query and response. There was no good reason why, suddenly, far more data was being sent to those computers.

Closer inspection revealed the culprit. "It was a rogue operator," said Mr Cook. "It had installed software on user`s handsets so it did not have to pay roaming charges."

The rogue was outside the UK and was funnelling customers data via DNS so it did not have to travel over the main mobile network and be paid for.

At its fastest, DNS can move data around at about 200 kilobits per second - much slower than most mobile networks. But, said Mr Cook, the fact that users paid nothing to browse the web overseas offset the inconvenience.

Back channel

Tom Neaves from security firm Trustwave said that might be plenty fast enough if an attacker wants to move a small amount of data - such as a password.

"A lot of people underestimate its potential as an attack tool because it was never meant to be used to transfer a lot of data," he said.

Mr Neaves has proved just how useful it can be for attackers by creating software that exploits DNS to slowly steal data.

 For criminal hackers intent on industrial espionage that slow rate is fine - especially when you consider that, on average, it takes companies more than 200 days to spot an intruder insider their network.



Trustwave has seen DNS exploited in other ways too, he said.

 It can be used as a command and control channel for a malicious program attackers have got running on a machine inside a network.

Or as a way for attackers to communicate across networks in different companies.

And it does not end there, said senior analyst Darren Anstee from network monitoring experts Arbor.

"There are a lot of ways to exploit DNS to do bad things," he said.

Most often Arbor had seen it used to carry out Distributed Denial of Service attacks that sought to knock a site offline by overwhelming it with data.

 Using well-known techniques, said Mr Anstee, DNS servers could be tricked into sending data to a particular site.

 If enough DNS servers are enrolled into the attack the amount of data turning up at a target site can be overwhelming.

Arbor had seen attacks that funnelled more than 100 gigabits of data a second at a target. 

That`s so much that it can have a knock-on effect on other systems on the same network.

"The attack tools exist and the capability is built into various botnets and crimeware services," he said. Online there are so-called "booter" services that abuse DNS in a bid to knock people off game servers.

Attack evolution

Attackers had targeted home routers in a bid to subvert their DNS settings so they can get a look at the traffic and scoop up login names and passwords as they travel, he said.


Public-spirited efforts such as the Open Resolver Project have helped to patch many vulnerable home routers and stop them being abused for either DDoS attacks or to steal data.

The OSR has enjoyed a lot of success and has managed to get about seven million devices fixed.

Unfortunately there are still about 20 million vulnerable devices accessible online, said Bruce van Nice, a director at DNS specialist Nominum.
"That`s a pretty good base of stuff that can be used for attacks," he said.

Defending against DNS-based attacks is hard because many of the defensive techniques used to counter other attacks do not work well when applied to DNS. 

This is because DNS only works well if data can travel quickly to and from servers.

 Inspecting each packet to see if it is properly formed and is not being used to steal data would slow the whole system down. 

Users would complain as web browsing slowed to a crawl.

There are techniques that can clean up traffic and mitigate DDoS attacks but defenders need to be aware that novel ways to abuse DNS are being produced all the time.

Adversaries are not idle and are refining their techniques, said Mr van Nice.

"We see activity every single day and we see evolution in those attacks so someone is improving their capabilities.

"They do not do that without good reason."


m1.png m2.png m3.png m4.png m5.png
f1.png f2.png f3.png f4.png f5.png
+ =
Exchange Rates
EUR/USD 1.0661
EUR/BRL 3.4097
EUR/AUD 1.4225
EUR/TRY 4.0387


Jan16      01:56
  1. Humidity 47%
  2. Downwind
  3. Winds 0 kph
Latest Videos
VIDEO: The Biology of Bliss and the Human OS - Jamie Wheal
Terror and Tourism: Changing the Travel Landscape
Earth In 2050 - HD Documentary 2015
The drive for gender equality in corporate Japan
Plane touches down then aborts during storm (VIDEO)
The Fermi Paradox II — Solutions and Ideas – Where Are All The Aliens (VIDEO)
Money Survival Tips for Millennials (VIDEO)
Lightning strike explodes a tree (VIDEO)
The Moons of Mars Explained (VIDEO)
3 Reasons Why Nuclear Energy Is Awesome! (VIDEO)
3 Reasons Why Nuclear Energy Is Terrible! (VIDEO)
Nuclear Energy Explained: How does it work (VIDEO)
Latest Photos
best cities for small businesses
Best Jobs in America (PHOTOS)
Inside the coolest private jets (PHOTOS)
The best hotel club floors in the world
Winning Images from the 2015 National Geographic Traveler Photo Contest
PHOTOS: Raging Wildfires Prompt Major Evacuation
Amazing Geometry Cities from air - Photos
Photos Bangkok Get snow - Opens Snow Village
Stunning Summer Aerials from Around the World (PHOTOS)