In this installment of our attack surface risk signals series, we cover the Domain Name System (DNS)
The Domain Name System (DNS) is a foundational technology of the modern Internet and World Wide Web. DNS, which dates to the early 1980s, provided a way of translating the unwieldy numeric addresses of Internet-connected systems into human-readable alternatives. Today, that nearly 40 year old technology is a pillar of the global economy: helping to translate and direct hundreds of billions of queries each day.
As demonstrated in the “DNSpionage” DNS hijacking attack campaign that spanned from 2017 into 2019, DNS is susceptible to various attacks. The type of manipulation and tampering featured in this campaign caused Internet requests to be diverted from their intended target to internet addresses controlled by the attackers. DNS compromise can also facilitate the operation of malicious software, as well as legitimate applications, or provide cover for data exfiltration and other risks to the integrity of your network, data and users.
DNS monitoring is critical for the security of your organization and external users. It’s easy to take proper DNS server functionality for granted, but without monitoring, attackers can exploit vulnerabilities without your knowledge. Monitoring this signal allows you to better understand your gaps and set off on the path to fix them.
Q:SCAN finds DNS risks
QOMPLX Q:SCAN passively analyzes public DNS records for your organization to help you mitigate any threats. We look for evidence of DNS spoofing (or “poisoning”) attacks that attempt to trick DNS resolvers into directing users to a site of the attacker’s choosing. By spotting poisoned DNS caches, Q:SCAN can warn your organization that users may have been tricked into visiting malicious websites - a key insight that can lead to further investigation.