Full Disclosure mailing list archives

Re: New DDoS attack vector


From: joris dedieu <joris.dedieu () gmail com>
Date: Thu, 19 May 2011 18:55:24 +0200

2011/5/19 minor float <minor.float () gmail com>

Dear list readers, on today we officially published our observations
regarding the new attack vector of the DDoS against the DNS servers.

A full story can be read here http://www.zone-h.org/news/id/4739

Here is the excerpt.


The attack phases are as follows:

The attacker obtains the IP address /​host­name of the tar­get DNS server.

The attacker updates the NS records of the pre-​registered domain foo
-domain​.com with the IP address /​host­name of the tar­get DNS
server. Some reg­is­trars or host­ing providers do not pro­vide this
func­tion­al­ity, many other do. There are known host­ing com­pa­nies
and ISP that are sup­port­ing the spam [5]. After the NS records
update the attacker waits at least 24 hours until the new records are
prop­a­gated all over the Internet.


Note that it's not possible with several tld. Eg : fr  nic, afinc.net (and I
hope some other)
checks that an SOA record is present  (and much more. See
http://www.zonecheck.fr)
on the name server before updating NS records in the registry.

Now the attacker pre­pares a spam cam­paign. There are few aspects to
note: as first, the sender mail address for the MAIL FROM can con­tain
the same user name, but the sub­do­main — 3rd level domain must vary
per each spam mes­sage (for exam­ple first spam mes­sage has the
sender james@​subdom1​.​foo-​domain.​com but the sec­ond sender has to
be james@​subdom2​.​foo-​domain.​com).

The sec­ond impor­tant aspect is the selec­tion of the white horse
sys­tems. White horse sys­tems are the SMTP incom­ing mail servers
with a high bandwidth.

Once the spam cam­paign has been started to the white horse sys­tems
using the spam bot­net, these sys­tems check on the back­ground
whether the sender’s domain resolves to the domain MX or at least to
an A record. Since the NS record is set to the tar­get DNS server, the
DNS requests will be per­formed to the tar­get DNS server.

Tar­get DNS server receives mul­ti­ple reg­u­lar DNS requests for the
bogus sub­do­main records(note that in the pre­vi­ous Denial of
Ser­vice attacks against the DNS servers received either mal­formed,
frag­mented, ICMP mes­sages or TCP SYN, with invalid length, or
over­sized and some of these can be fil­tered by the fire­walls or
secu­rity appli­ances). Since the DNS server does not have the records
for the foo​-domain​.com, it has to respond neg­a­tively to the
request. If the spam cam­paign is suc­cess­ful, the white horse
sys­tems flood the DNS server with mul­ti­ple valid DNS requests.

Regards

Jakub Alimov [Seznam.cz]
minor [zone-h.org]

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: