Follow-up to fergdawg, the Georgia Tech/Google study made it on
the wires today (including the front section of our local Oregonian,
below is the Times of India version).

Congrats to NANOG and all the presenters for the network center
energy efficiency segment today.  I'm not really active on the network
side these days (though a NANOG lurker since 1996 or so) but my
history in energy efficiency work goes back to 1983 and it's great
to see this finally getting really top-level attention and the session
was really good today in covering many if not all of the layered
aspects of the issue.

cheers, and back to mode.lurk


Fred

-----------------

http://infotech.indiatimes.com/articleshow/2785722.cms

Did you know servers can lie

AP

SAN FRANCISCO: They're called “servers that lie.”

Mendacious machines controlled by hackers that re-route Internet
traffic from infected computers to fraudulent websites are
increasingly being used to launch attacks, according to a paper
published this week by researchers with the Georgia Institute of
Technology and Google Inc.

The paper estimates roughly 68,000 servers on the Internet are
returning malicious Domain Name System results, which means people
with compromised computers are sometimes being directed to the wrong
websites -- and often have no idea.

The peer-reviewed paper, which offers one of the broadest
measurements yet of the number of rogue DNS servers, was presented
at the Internet Society's Network and Distributed System Security
Symposium in San Diego.

The fraud works like this: When a user with an affected computer
tries to go to, for example, Google's website, they are redirected
to a spoof site loaded with malicious code or to a wall of ads whose
profits flow back to the hackers.

The hackers who hijack DNS queries are looking to steal personal
information, from email login credentials to credit data, and take
over infected machines.

The spoof sites run the gamut. Some are stunningly convincing,
others amusingly bogus with spelling errors and typos.

The DNS system is a critical part of the Internet's infrastructure,
used to make sure computers know how to contact each other. People
usually automatically use the DNS servers of their Internet
providers, but the recent wave of attack modifies the settings on
victims' computers to send traffic to rogue DNS servers.

Attacks using manipulated DNS results aren't new. Profit-driven
hackers have a strong incentive to control where users go on the
Web. The paper looked at viruses that started appearing in 2003
designed to alter the DNS settings on infected computers.

The report noted that the rogue DNS servers don't always return
incorrect results, often fooling users into believing their Internet
access is working properly. Hackers thus can route users to
malicious websites whenever they choose.

Most up-to-date antivirus software will catch and banish the viruses
used to change DNS settings. Once a computer has been infected,
users need to run a new scan with the latest software and change
their DNS settings back -- which is easy.

Security experts not involved in preparing the paper said it adds
valuable data about the scope of an increasingly popular type of
attack.

“A lot of people don't realize the seriousness of it,” said Paul
Ferguson, a threat researcher with Trend Micro Inc. “The problem is
getting worse.”

Reply via email to