Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Poisoned web poses risk to security
New Scientist ^ | 4/23/05 | Celeste Biever

Posted on 04/23/2005 3:16:47 PM PDT by LibWhacker

COMPUTER criminals are coming up with ever stealthier ways to make money. Rather than attack PCs or email inboxes, their latest trick is to subvert the very infrastructure of the internet, the domain name system (DNS) that routes all net traffic.

In doing so, they redirect internet users to bogus websites, where visitors could have their passwords and credit details stolen, be forced to download malicious software, or be directed to links to pay-per-click adverts.

This kind of attack is called DNS cache poisoning or polluting. It was first done by pranksters in the early years of the internet, but it had limited impact and security patches eliminated the problem.

Now new loopholes have opened and poisoning appears to be back. This time experts can't be sure how much damage it might do. "We see the combination of DNS poisoning with other hostile actions as having a serious impact," says Swa Frantzen, a Belgium-based volunteer member of the SANS Internet Storm Center, a virtual organisation that monitors threats to the internet and has identified a recent spate of poisonings. In contrast, Joe Stewart of net security company Lurhq in Chicago, Illinois, who has documented the history of DNS poisonings, says there is no cause for alarm. "I think it's going to slowly die out," he says.

Poisoning is possible because of the way computers talk to each other to find internet addresses. The DNS is a global network of servers that, among other things, takes surfers to whatever websites they request. So for instance, if you are at work and you enter www.newscientist.com into a web browser, your PC will ask your company's DNS server to take it to the numeric Internet Protocol address that represents that domain name.

Your company's DNS server may know the IP address of the newscientist.com DNS server, but if it does not, it forwards the request to a DNS server of a local internet service provider. That ISP will know the newscientist.com address, or forward the request to a bigger ISP. This continues via a succession of computers until your PC discovers the location of the full IP address (see Diagram).

The DNS is also designed to take short cuts. Once your DNS server has learned the location of www.newscientist.com, it stores it in a cache and routes directly to it. But herein lies the weakness of the system, because hackers can persuade some servers to cache "poisoned" information.

First they set up their own DNS server called, say, hacker.com. From here, they poison your company's DNS server by sending an email to a bogus email address at your company. This forces your company's server to exchange information with the hacker.com server, and that interaction gives the hacker a chance to insert a malicious code onto your company's server.

Stage two takes place when you next type www.newscientist.com into your browser. This time the hacker has instructed your company's server to send requests for this, and any other URLs they specify, to hacker.com. There the hacker has constructed a fake New Scientist web page; it looks identical, except the hacker gets to see any personal info you type in.

Replace New Scientist with your bank, and you can see how account holders could be conned into entering personal details and passwords onto a fake site without ever knowing.

Internet poisoning returned to the fore in early March, when DNS software provided by antivirus firm Symantec was found to have a bug that made poisoning possible. Weeks later, the SANS centre uncovered a second spate of poisonings, but this time it was due to a security loophole.

Most ISP servers run a free piece of DNS software called BIND, while most businesses' servers run Microsoft Windows DNS software. Both have been patched to stop hackers inserting bogus commands and poisoning cached information. However, the SANS centre says the loophole appears when a company couples servers together to increase the cache size. If one server runs an older version of BIND, such as BIND 4 or BIND 8, then it will forward on any poisoned information, and this will be accepted by recipient "child" servers running Microsoft.

Companies can protect themselves by switching to BIND 9, which will not accept or pass on poisoned information. But Gerhard Eschelbeck of the internet security company Qualys in Redwood Shores, California, says the problem may not be over. "I would not rule anything out. There are other creative ways that attackers can find to poison the DNS," he says. And poisoning is a much bigger deal than it was in the early days, because hackers can now use the technique to introduce "malware" onto servers and PCs, says Frantzen.


TOPICS: News/Current Events; Technical
KEYWORDS: computersecurity; dns; internet; isp; poisoned; route; servers; traffic; web

1 posted on 04/23/2005 3:16:48 PM PDT by LibWhacker
[ Post Reply | Private Reply | View Replies]

To: LibWhacker

Clever. But insidious. A poison that progresses with few or no symptoms to indicate its gravity.

2 posted on 04/23/2005 3:54:31 PM PDT by upchuck ("If our nation be destroyed, it would be from the judiciary." ~ Thomas Jefferson)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

The great mystery is why the corporate world does not unite and end this slow motion destruction of the web.
Spam and spy ware could not exist if it were not for the passive approval of the major credit car companies. If Visa, MasterCard, etc refused to process transactions from the business which use Spam and spy ware to market their products a vast majority of this activity would disappear.
A hacker can do 20 million dollars damage and in most cases be punished less severely than some kid who steals a 6 pack from 7-11.
I see virtually no effort track down and blockade traffic from ISPs and blocks of IP addresses used by spammers.

Your computer can literally be hijacked and mad unusable by an aboveground company which advertises its marketing services to Fortune 500 companies.

Companies which are actively and blatanly damaging millions of computers will have their lawyers threaten the companies which make programs to protect your computer, trying to force them to stop blocking the attacking software.


3 posted on 04/23/2005 4:02:18 PM PDT by Jonah Johansen
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #4 Removed by Moderator

To: LibWhacker
Paging the InfoSec pinglist...
Let me know if you want to be 1 or 0. (That's ON or OFF, for those who are not binary-compliant)



5 posted on 04/25/2005 3:53:25 PM PDT by adam_az (Support the Minute Man Project - http://www.minutemanproject.com/Donations.html)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Weirdad; enotheisen; Quix; agitator; Ed_in_NJ; 1234; codyjacksmom; American_Centurion; ...
Paging the InfoSec pinglist...
Let me know if you want to be 1 or 0. (That's ON or OFF, for those who are not binary-compliant)



6 posted on 04/25/2005 3:53:50 PM PDT by adam_az (Support the Minute Man Project - http://www.minutemanproject.com/Donations.html)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson