@pmevzek @TheGibson
I would put more thought into how all of this can be attacked and/or abused.
It is always DNS. It is always BGP.
@pmevzek @TheGibson
I would put more thought into how all of this can be attacked and/or abused.
It is always DNS. It is always BGP.
Fast Flux: Enabling Robust Malware, C2 and Phishing Networks
“Fast flux” is a technique that has been recently used by threat actors to obfuscate
the locations of malicious servers through rapidly changing Domain Name System
(DNS) records associated with a single domain name and establish robust C2
infrastructure capable of surviving attempts to dismantle it. Fast
Pulse ID: 67f42761b4cf9e873fd49513
Pulse Link: https://otx.alienvault.com/pulse/67f42761b4cf9e873fd49513
Pulse Author: cryptocti
Created: 2025-04-07 19:28:33
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
Is the sky fluxxing?! Last week a CISA advisory on DNS Fast Flux created a lot of buzz. We have an insider's take.
Fast Flux is a nearly 20 year old technique and is essentially the malicious use of dynamic DNS. It is critical that protective DNS services understand this -- and all other DNS techniques -- on that we agree.
What we also know as experts in DNS is that there are many ways to skin a cat, as they say.
#dns #threatintel #cisa #malware #phishing #threatintelligence #infobloxthreatintel #infoblox #cybercrime #cybersecurity #infosec
@bortzmeyer
Stub envoi la requette a un #dns authoritative (pas de récursion authorisée)
Forward -> open bar!
Je n'ai jamais réussi à retenir la différence entre stub et forward, je dois regarder la doc' à chaque fois.
"French Court Orders Cloudflare to ‘Dynamically’ Block MotoGP Streaming Piracy"
https://torrentfreak.com/french-court-orders-cloudflare-to-dynamically-block-motogp-streaming-piracy-250405/
Cloudflare's public #DNS resolver, 1.1.1.1, apparently did not implement it yet.
PowerDNS Recursor Security Advisory 2025-01 (aka PowerDNS Recursor 5.2.1 Released)
https://blog.powerdns.com/2025/04/07/powerdns-recursor-5-2-1-released #dns #dnssec
Somebody, somewhere must occasionally still be falling for the .cn domain name scam, one from simon@netdomains.net.cn inboxed here today.
See https://nxdomain.no/~peter/domain_name_scams_are_alive_and_well_thank_you.html for an overview of the shitheadery. #dns #scams #domainnamescam #cndomains #netdomains #cybercrime #spam
@fleaz : it's not MultiMultiFactorAuthentication but 1FA max.
Assuming that you don't use those hardware keys to generate TOTP codes (which are pointless when confronted with the likes of #Evilginx2), but use WebAuthn instead (FIDO2 passkeys in hardware keys), everything depends on one factor: the domain name of the website.
DV-CERTS SUCK
It is not very common that certificates are issued to malicious parties, but it *does* happen now and then (https://infosec.exchange/@ErikvanStraten/112914050216821746).
SUBDOMAINS
Furthermore, sometimes organizations have "dangling" subdomain names. For example,
test.example.com
may point to the IP-adress of some cloud server no longer used by example.com. Anyone with write access to that server may install a fake "test.example.com" website and phish you to it. It *may* be used to phish your WebAuthm credentials *if* "example.com" does not explicitly *DENY* WebAuthn from "test.example.com".
See https://github.com/w3ctag/design-reviews/issues/97#issuecomment-175766580 for how Google prevents "sites.google.com" from authenticating to "google.com".
DNS HACKED
It may not be neccessary to execute BGP-hijacks to redirect network traffic to an impostor: it also all depends on how reliable DNS records are protected against unauthorized access. If the dude in charge for DNS uses a stupid password only, or the DNS provider is easily fooled into believing "I forgot my creds", it's game over. The crooks will obtain a DV-cert in no time, no questions asked, for free.
All the bells and whistless are moot if there's an alternative way to log in (such as by using a 1FA rescue code) and the user is fooled into providing it (after they've been lied to that their WebAithn public key on the server became corrupted or was lost otherwise).
Cloudflare MitM's https connections (it's not a secret: https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/). The same applies to any server you log in to, which is accessible by untrustworthy personnel. They can steal your session cookie.
In the end MFA/2FA is a hoax anyway, because the session cookie (or JWT or whatever) is 1FA anyway.
Did I mention the risks of account lockout with hardware keys that cannot be backupped? And the mess it is to keep at least one other hardware key synchronized if it's in a vault? And the limitation of, for example, 25 WebAuthn accounts max? And (unpatcheable) vulnerabilities found in hardware keys? And their price? And how easy it is to forget or loose them?
Grandoreiro Stealer Targeting Spain and Latin America: Malware Analysis and Decryption Insights
A new campaign utilizing the Brazilian stealer Grandoreiro has been detected targeting Spain and Latin American countries. The malware, active since 2017, aims to steal sensitive information, including banking credentials and personal data. It employs advanced evasion techniques such as string encryption and anti-sandbox measures. The campaign distributes Grandoreiro through phishing emails containing VBS files. Once executed, it performs various checks to evade detection and uses legitimate services for geolocation and DNS resolution. The report provides detailed insights into the malware's behavior and explains the string obfuscation and decryption techniques used in this campaign.
Pulse ID: 67f038fac3f02d82df0a9833
Pulse Link: https://otx.alienvault.com/pulse/67f038fac3f02d82df0a9833
Pulse Author: AlienVault
Created: 2025-04-04 19:54:34
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Shaarli: DNS over HTTPS and DNS over TLS - Serveurs DNS du fournisseur de VPN Mullvad.
Comprend plusieurs niveaux de blocage (publicités, malwares, etc.). : https://mullvad.net/fr/help/dns-over-https-and-dns-over-tls #dns #serveurs #menteurs
#Shaarli: Changer les DNS Bouygues Telecom et imposer les DNS depuis la BBOX - PREMIUM OTT Officiel - Méthode pour forcer d'autres DNS sur la BBox que ceux par défaut, normalement pas remplaçables.
2 liens :
* https://mabbox.bytel.fr/firewall.html
* https://mabbox.bytel.fr/dhcp.html : https://ott-premium.com/fr/changer-les-dns-bouygues-telecom/ #dns #bbox
Tiens, c'est bizarre.
Le navigateur mobile Ironfox arrive à contourner le blocage DNS configuré sur PersonalDNSFilter , se comporte comme s'il n'existait pas du tout...
Fennec par contre ne le passe pas.
@YggTorrent
Ou pourquoi pas pour ceux de @mullvadnet.
Il y a le choix entre le DNS neutre et 5 autres options qui permettent de filtrer différents contenus : publicités, traqueurs, logiciels malveillants, porno, jeux d'argent et médias sociaux.
https://mullvad.net/fr/help/dns-over-https-and-dns-over-tls#specifications