Subject: AA19-024A: DNS Infrastructure Hijacking Campaign |
From: "=?US-ASCII?Q?US-CERT?=" <US-CERT@ncas.us-cert.gov> |
Date: 1/24/2019 3:33 PM |
To: Fido4cmech@lusfiber.net |
National Cyber Awareness System:
01/24/2019 03:01 PM EST
Original release date: January 24, 2019
SummaryThe National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolve. This enables the attacker to redirect user traffic to attacker-controlled infrastructure and obtain valid encryption certificates for an organization’s domain names, enabling man-in-the-middle attacks. See the following links for downloadable copies of open-source indicators of compromise (IOCs) from the sources listed in the References section below: These files will be updated as information becomes available. Technical DetailsUsing the following techniques, attackers have redirected and intercepted web and mail traffic, and could do so for other networked services.
MitigationsNCCIC recommends the following best practices to help safeguard networks against this threat:
References
Revisions
This product is provided subject to this Notification and this Privacy & Use policy. |