Number of Rogue DNS Servers on the Rise 154
bosoxsux writes "Rogue DNS servers are an increasingly popular tool for scam artists, according to a new report. Their numbers are on the rise, in part because they're difficult for antivirus software to deal with. 'There are now approximately 68,000 rogue DNS servers across the Internet, The authenticity of the sites such servers redirect to varies greatly, from near-perfect copies to laughably bad, but the problem they represent is quite serious. Once an end user's computer has been modified to use a poisoned DNS server, the system can be directed to any fake web site the malware author feels like serving up.'"
certs too (Score:5, Interesting)
Re: (Score:1)
Do you have a newsletter? I'd subscribe to it.
Re: (Score:2)
Re: (Score:2)
Suddenly, (Score:1)
Re: (Score:3, Informative)
Too many ways to add a new root certificate.
Re: (Score:3, Informative)
Too many ways to add a new root certificate.
Re: (Score:3, Insightful)
Heck, when you have enough access to a machine to change its DNS settings, you have enough access to flush the cache or to just disable all SSL safety checks.
Simple fix for those running Windows? (Score:2, Informative)
netsh interface ip add dns "Local Area Connection" 4.2.2.1 index=2
Doesn't seem to hard to fix this exploit, sneaky as it may sound. Of course, run FF/NoScript etc...
Re:Simple fix for those running Windows? (Score:5, Insightful)
Re: (Score:3, Insightful)
How can they not? (Score:3, Insightful)
Otherwise, I'll have to use someone else's DNS or do without.
Re: (Score:2)
Most users OTOH fear those things.
Re: (Score:1)
What're you talking about? I know exactly what a Dorrito's Nachos Server is. Now if only she would hurry up and bring my plate out here....
Re:Simple fix for those running Windows? (Score:4, Interesting)
Then clients can grab the results from any DNS server and validate that they are actual results or phonies.
Caveat: This would add another layer of processing and fetching keys, slowing everything down, when DNS is supposed to be a quick way to fetch an IP from a host name. You also have your usual PKI issues as well, such as compromised keys, expired certifications, etc.
Re:Simple fix for those running Windows? (Score:5, Interesting)
Re: (Score:2)
Re: (Score:1)
So fake site look more real? (Score:1)
Key word is 'modified' (Score:1)
I can think of a few possible ways to do this--a worm that modifies default-passworded routers, for instance, would be capable of modifying DNS entries at the router level--but is there an easy exploit to do so at the end-user's computer? Or a method of modifying the DNS via a browser window?
Re: (Score:2)
Re: (Score:1)
Re:Key word is 'modified' (Score:4, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:2)
But that's a whole 'nother (mega)thread...
Huh? (Score:4, Funny)
You can run Rogue on a DNS server? Sweet! I know what I'm doing this weekend...
Re:Huh? (Score:4, Funny)
Interesting problem (Score:2)
Re: (Score:2)
Hijack it yourself (Score:5, Interesting)
Whenever I set up the network infrastructure for a business, particularly on that has a lot of laptops, I make sure to intercept all DNS traffic and redirect it to a local server (since most of the boxes are routers, firewalls, NTP and DNS servers all in one, on (Open|Free)BSD this is easier).
For PF, it's as simple as:
rdr pass on $if proto {tcp,udp} from any to any port 53 -> 127.0.0.1 port 53
If you still use IPFilter, use this rule in ipnat.rules:
rdr de0 0.0.0.0/0 port 53 -> 127.0.0.1 port 53 tcp/udp
Re:Hijack it yourself (Score:4, Informative)
Drop any incoming packets on the internal interface on port 53 that aren't addressed to the gateway. That'll allow you to keep an eye on the DNS servers easily on a machine that's presumably running *nix and not as susceptible to viruses without having to set up your own.
Simple alteration (Score:2)
Worrying news FTA (Score:5, Funny)
Now I'm afraid that I'm a victim of this scam. It looks like this "Slashdot" site I've been using could actually be nothing more than a bad spoof...
Sounds like an ISP opportunity (Score:5, Interesting)
A cleaning service would act like a deep-packet-inspection router but at the ISP head end.
Useful services to offer:
* net-nanny/thinkofthechildren content blocking
* block known hostile/poisoned sites
* tattletale/reporting
* time-of-day blocking
* login-required services - no port 80 or 443 without a cookie identifying which member of the family is using the computer
* DNS interception/reroute to canonical ISP DNS
* DNS interception/reroute to modified-for-the-customer ISP-provided DNS
* DNS interception blocking DNS to known rogue sites
* much, much more
* Arbitrary, customer-controlled port blocking for inbound and outbound ports
ISPs should offer "protect the network" or "protect from criminal activity" blocks like poisoned-DNS blocks for free/build the cost into their basic rates, and charge a premium for parental-control/business-use-control services.
Of course they shouldn't force anyone to use these services if they don't want to.
Re: (Score:1)
Put it in enough marketspeak, and you'd be all set.
Re: (Score:3, Informative)
Is this about OpenDNS redirecting www.Google.com? (Score:5, Interesting)
Re:Is this about OpenDNS redirecting www.Google.co (Score:2, Informative)
As you probably already know (why else are you posting as an AC?) this is a workaround for a nasty thing that Dell and Google have come up with to present the user with a screen full of ads when they make a typo in the search box. It's installed by default on new Dell machines. It's impossible for an ordinary user to to turn off. I'm a hardcore techie and I had a rough time with it on my new Inspiron. More details here: http://blog.opendns.com/2007/05/22 [opendns.com]
Re:Is this about OpenDNS redirecting www.Google.co (Score:5, Insightful)
FUD? There's no FUD about it: if you use OpenDNS and perform a Google search, your search queries are being proxied through OpenDNS's servers. That's quite a breach of trust because -- unless they've changed something since I last checked -- this proxying of search data isn't exactly advertised to the user in advance. Even if I felt I could absolutely trust OpenDNS with all my data, such covert behavior would still make me uncomfortable.
As for the Google/Dell deal: yeah, it's evil, and the OpenDNS guys are right to bring attention to it. But it's a problem that needs to be solved at the application level, not by mucking around with users' DNS whether they're on an affected Dell or not. It's the wrong place and the wrong approach to solve this problem, and borderline creepy to boot.
I'm not sure why you're so angry with the Anonymous Coward for pointing this out; everything he said was unbiased and factually accurate. If the truth is going to "convince people not to use OpenDNS," then so be it.
Re: (Score:2)
But still, that thing is indeed a little bit disappointing. I'm not sure if OpenDNS has the right to call it spyware though. It seems to fit the definition of adware. But like this, OpenDNS can see everything that's supposed to go to google.com. And IMHO, a truly paranoid person should trust OpenDNS as much as he/she trusts Google... Pot, kettle?
Re: (Score:2)
And this is also a reason Dell doesn't like Linux on consumer desktop PCs; they lose all that recurring ad revenue.
Scary stuff... Could even hit OS X easily (Score:2, Interesting)
Wham-bam, the porn-viewer, or icon-designer has now changed your DNS settings...
Considering that most OS X virus scanners are still either in infancy, or completely ineffective this would be an easy target.
What's the best strategy against something like this? Installing apps in ~/Applications vs
Maybe Apple could make that the default behavior, or
Re: (Score:2)
I think the best defense on the part of all OS writers would be to make it so
easy to prevent (Score:1)
DNSSEC provides a solution (Score:5, Informative)
Re: (Score:2)
And given that the switch to the untrustworthy DNS resolvers typically occurs when the user installs some alleged video codec, it would be easy to add additional DNSSEC trust anchors at this stage, too. For X.509 web server CAs, it has already been demonstrated that this is feasible when Comscore, through its Ma
MOOT! (Score:1)
DNS is obviously a failure.... (Score:3, Funny)
Re:DNS is obviously a failure.... (Score:5, Funny)
Re: (Score:2)
That's why real geeks know by heart their ISP's
1) Gateway IP address
2) Gateway MAC address
3) Subnet Mask
4) DNS IP address
5) DNS MAC address [if on local subnet]
6) DHCP Server MAC Address
Anything less is just being careless
Re: (Score:2)
You're going to love the day IPv4 gets abandoned in favour of IPv6...
Re: (Score:2)
We are running out of dot-quads. They have this new supply of colon-hex things, but they are sooooo big.
Re: (Score:2)
There are not enough IPv4-addresses to host all the websites, most use HTTP-Host-headers-fields (more then one site per IP-address).
So it would not be dot-quads, but IPv6-addresses if we would want to keep all sites online, I wish you luck.
Find'em Kill'em (Score:2)
Idea for preventing this stuff (Score:2)
Can a DNS request ask for two domains at once? If so, I think that this sort of attack could be blocked without having to upgrade all servers at once.
In addition to your normal request, you could ask for the IP address of "jl39dl9
read more, submit less (Score:5, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re:read more, submit less (Score:5, Informative)
Re:read more, submit less (Score:4, Insightful)
The default networking settings in a computer is to grab IP and DNS settings from the WIFI. This will get the rogue DNS right in.
The way around is to change networking settings to have the DNS to point to a pre-chosen known ISP, but how many are doing that.
Mod Parent Up, Please! (Score:5, Interesting)
That doesn't mean, of course, that logging onto a random "linksys" SSID in a residential neighborhood won't actually get you a rogue DNS installed on a virus-infected computer, or a kid's wireless system trolling for passwords from nearby gamerz. But those are at least not *guaranteed* to be hijacking you.
Huh? (Score:2)
Can somebody actually show me a "rogue" DNS server?
What constitutes a "rogue" dns server? One that doesn't track exactly the US Government root or one that has incorrect addresses for sites for commercial gain (ie paypal, banks etc).
About a decade ago a guy went to prison for redirecting the internic by DNS cache poisoning. It was a big deal. Now I'm suppoed to believe 60,000 people are doing it and it's not in the news?
The half dozen or so ISP's around here, and
Re: (Score:3, Interesting)
Personally I think the boys and girls at MS should release a critical security update (you know ones that go off regardless of weather you have them enabled or not [-1 troll]) which launches a wizard to educate users about the d
Re: (Score:2, Informative)
Re: (Score:3, Informative)
Seems a good compromise.
Re: (Score:2)
Re: (Score:3, Interesting)
Or perhaps you're one of the many people clever enough to use someone else's insecure wireless network to access the internet?
Re: (Score:2)
I don't see why they wouldn't go for a poisoned HOSTS file. It's also been done in the past, and would be much harder to spot since so relative few people would think to look there if problems arise. Of course, the disadvantage of that approach is that
Re: (Score:2)
I imagine that the next version will lock your DNS settings.
Re: (Score:2)
Re: (Score:2)
Given the number of Windows zombies out there in the wild I assume rooting a box is old hat now days.
Anyone gotta link to the paper (Score:2)
Real Men Don't Use DNS (Score:2)
Re: (Score:3, Informative)
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re:if I were to own a rogue DNS server (Score:5, Interesting)
Re: (Score:1)
Re: (Score:1)
Or perhaps the author of the exploit wishes to spread things in a subtle manner, so as to delay discovery of their malware?
Or maybe someone's after you. Check your tinfoil hat.
Re:if I were to own a rogue DNS server (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
In the google age a solution for a problem like that can be found and used by a non-technical person easily. It's entirely possible that your girlfriend saw the ad, was annoyed, googled it, and found a step-by-step to get rid of it.
Now get off slashdot! You're not allowed to have a girlfriend here! Can you imagi
Re: (Score:2, Funny)
Re:if I were to own a rogue DNS server (Score:5, Informative)
Get a lot of folks who have the money for a broadband connection that way--the folks with money and not much sense who are really ideal for identity theft.
Re: (Score:2)
Of course, unless they've enabled remote administration, you wouldn't be able to access the router from outside the user's home LAN. That's where hacking the wireless connection comes in. ^_^
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Or do it in reverse order, and get the machine first and the router after--so even if they fix their machine, on the next resynchronization they'd be hijacked again.
Re: (Score:2)
Don't most routers disable wireless control panel access by default as well?
Waiting for the Worms (Score:3, Funny)
Ooooh, no matter how you try
Goodbye, cruel 'Net, it's over
Surf on by.
Sitting in a bunker here behind fire-wall
Waiting for the worms to come.
In perfect isolation here behind fire-wall
Waiting for the worms to come.
We're {waiting to succeed} and going to convene outside Pharmington
Dot Com where we're going to be...
Waiting to infect their PC.
Waiting to read all their e-mail.
Waiting to follow the worms.
Waiting to set up fake bank sites.
Waiting to update the rootkits
It's a tree, not a shrubbery. (Score:2)
So far, so nothing much. However, it's the first response to queries that matters,
Re: (Score:2)
http://it.slashdot.org/article.pl?sid=08/02/10/0136236 [slashdot.org]
Your attack won't work since DNS uses a 16-bit randomized ID on each request and rejects any response with a non-matching key. Of course some DNS servers may not check the key, but Bind does.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
You can fool most people in doing anything these days, it's called social engineering.