Skip to main content

H-ISAC TIC Threat Bulletin

Date: January 24, 2019

TLP – WHITE

Event: Weaknesses in Managed DNS Providers Processes Allow for Domain Hijacking

Summary: Earlier this month, the US-CERT issued a bulletin with information on a large DNS infrastructure hijacking campaign. Ars Technica has also recently published an article that includes more detail on a weakness attackers targeted in order to hijack domains, and a link to a list of vulnerable domains. The TIC has chosen to issue this bulletin, as there is a potential for H-ISAC member domains to be affected.

Relevance: It is likely that H-ISAC members own domains that may be affected.

Potential Actions:

· Implement multi-factor authentication on domain registrar accounts, or on other systems used to modify DNS records.1

· Verify that DNS infrastructure (second-level domains, sub-domains, and related resource records) points to the correct Internet Protocol addresses or hostnames.1

· Search for encryption certificates related to domains and revoke any fraudulently requested certificates.1

· Considering checking the following linked list to determine whether any URLs owned by your organization are included, and take action as appropriate: hxxps://pastebin[.]com/raw/wgCWLz8K

· Validate A, NS, MX record changes.3

· Validate the source IPs in OWA/Exchange logs.3

References:

1. hxxps://www.us-cert[.]gov/ncas/current-activity/2019/01/10/DNS-Infrastructure-Hijacking-Campaign

2. hxxps://arstechnica[.]com/information-technology/2019/01/godaddy-weakness-let-bomb-threat-scammers-hijack-thousands-of-big-name-domains/

3. hxxps://www.fireeye[.]com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html

4. hxxps://blog.talosintelligence[.]com/2018/11/dnspionage-campaign-targets-middle-east.html

Cyber Vulnerability, Cybersecurity

This site is registered on Toolset.com as a development site.