IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

DNS loophole could allow hackers to carry out “nation-state level spying”

Sensitive data could be accessed from corporate networks using vulnerability

Letters DNS displayed on a blue high tech background

Security researchers have discovered a flaw within major DNS-as-a-Service (DNSaaS) providers that could allow hackers to access confidential data within corporate networks.

Shir Tamari and Ami Luttwak, researchers at cyber security firm Wiz, found a loophole that allowed them to intercept a portion of worldwide dynamic DNS traffic going through managed DNS providers like Amazon and Google.

“Essentially, we “wiretapped” the internal network traffic of 15,000 organizations (including Fortune 500 companies and government agencies) and millions of devices,” said Tamari.

“It was a bottomless well of valuable intel - computer names, employee names and locations, and details about organizations’ web domains including entry points that are exposed to the internet.”

He added that there is no way of knowing whether hackers have already exploited the loophole and collected data undetected for over a decade. Leaked information from the flaw can contain internal and external IP addresses, computer names, and, sometimes, NTLM / Kerberos tickets.

“The root cause of the problem is the non-standard implementation of DNS resolvers that, when coupled with specific unintended edge cases on the DNS service provider's side, cause major information leakage from internal corporate networks,” said Tamari. 

In a presentation at this year’s Black Hat conference in Las Vegas, researchers showed how Microsoft Windows endpoints revealed sensitive customer information when performing DNS update queries.

Related Resource

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Prevent fraud and phishing attacks with DMARC - whitepaper from MimecastFree download

“The security risk is high. If an organization's DNS Updates are leaked to a malicious 3rd party, they reveal sensitive network information that can be used to map the organization and make operational goals,” added the researchers.

Internal IP addresses reveal the organization’s network segments; computer names hint at the potential content they may hold; external IP addresses expose geographical locations and the organization's sites throughout the world; and internal IPv6 addresses are sometimes accessible from the outside and allow an entry point into the organization, according to researchers.

“The impact is huge. Out of six major DNSaaS providers we examined, three were vulnerable to nameserver registration,” said Tamari.

Researchers added that any cloud provider, domain registrar, and website host who provides DNSaaS could be vulnerable. Tamari said that while two major DNS providers (Amazon and Google) have fixed the issue, others may still be vulnerable. “As a result, millions of devices are potentially vulnerable,” he said.

Featured Resources

Mastering retention

Turning user behaviour insights into retention strategies

Free Download

Dell PowerEdge with AMD

IT applications and infrastructure are the prime catalyst for new revenue creation

Free Download

Building for success with off-premises private cloud

Leveraging co-location facilities to execute your cloud strategy

Free Download

Cyber resiliency and end-user performance

Reduce risk and deliver greater business success with cyber-resilience capabilities

Free Download

Recommended

The future of work is already here. Now’s the time to secure it.
Whitepaper

The future of work is already here. Now’s the time to secure it.

21 Sep 2022
WordPress plugin vulnerability leaves sites open to total takeover
vulnerability

WordPress plugin vulnerability leaves sites open to total takeover

14 Sep 2022
New approach to ransomware encryption threatens to undermine cyber security strategies
ransomware

New approach to ransomware encryption threatens to undermine cyber security strategies

12 Sep 2022
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Sep 2022

Most Popular

46 US states call for Meta monopoly lawsuit to be reinstated
mergers and acquisitions

46 US states call for Meta monopoly lawsuit to be reinstated

20 Sep 2022
Anonymous hacks Iranian government and state broadcasters
cyber attacks

Anonymous hacks Iranian government and state broadcasters

22 Sep 2022
Why collaboration is key to digital transformation
Sponsored

Why collaboration is key to digital transformation

13 Sep 2022