DNS Attacks Take Out Google, PayPal In Romania

Romanian versions of Google, PayPal, Yahoo and a host of other sites were defaced today thanks to some DNS attacks.

An Algerian hacker took credit for the hits, leaving a portentous message: “To be continued…”.  Kaspersky and Microsoft sites were also affected, but it appears the DNS servers have been cleaned of malicious activity.

It now seems likely domain servers at the Romanian Top Level Domain Registry (RoTLD) have been compromised, Kaspersky said. Yet the security company was thankful the hacker did not redirect people to malware downloads or phishing pages.

“All this could have been much worse if the attacker had other goals in his mind than just becoming famous by defacing famous websites. Imagine how many accounts could have been compromised this morning if these websites were redirected to a phishing page, instead of a defacement page,” said Kaspersky Lab expert Stefan Tanase, in a blog post.

Rise in DNS attacks

These DNS attacks in Romania came in a month where hits at that level have been abnormally prominent. Another spate of defacements took place in Pakistan earlier this week when PKNIC, which manages part of the DNS for a variety of the country’s top level domains, was hit.

Furthermore, a host of Go Daddy customers were compromised earlier this week and had their DNS settings tampered with. This led to visitors to specially-crafted subdomains on Go Daddy-hosted sites being redirected to pages serving up ransomware. The malware locked users out of their machines and demanded payment to unlock their systems.

One major issue is DNS cache poisoning, which had initially been suspected as the cause of the Romanian incident today. DNS cache servers hold domain name resolutions, which are initially delivered from an authoritative DNS server, which translate URLs (e.g. TechWeekEurope.co.uk) into IP addresses (e.g. 1.2.3.4).

In an attack scenario, a hacker determines when a DNS cache server is going to erase memory of a domain name resolution. They then “poison” the cache server by telling it to resolve domain name requests to their own websites. This works if, firstly, they beat the authoritative DNS server to supplying the information to the cache server, and, secondly, they guess the right query parameters for a request.

Such problems could be fixed with implementation of DNSSEC, which comprises of various pieces of code, with the aim being to sign different stages of the DNS lookup process. This would mean that DNS servers would only process requests from trusted sources.

But, to date, DNSSEC has seen minimal uptake across the world.

Think you’re a security pro? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Tesla To Ask Shareholders To Reinstate Elon Musk’s $56 Billion Package

Tesla shareholders to be asked to reinstate Elon Musk's $56 billion pay package, days after…

9 hours ago

Telegram To Reach One Billion Users Within Year

Catching WhatsApp? Billionaire founder of Telegram claims encrypted platform will reach one billion users within…

10 hours ago

Judge Dismisses Some Harm Claims Against Meta, Zuckerberg

Good news for Mark Zuckerberg as judge dismisses some claims in dozens of lawsuits alleging…

12 hours ago

Google Begins Removal Of California News Ahead Of Proposed Law

Consequences of Assembly Bill 886. Google begins removing California news websites from some search results

13 hours ago

Tim Cook Says Apple Considering Factory In Indonesia

CEO Tim Cook during visit to Jakarta says Apple will look into building a manufacturing…

13 hours ago

Canada To Implement Digital Services Tax This Year

Introduction of digital services tax on tech firms will begin in 2024 Canadian government confirms,…

17 hours ago