Security Bulletin: Crafted DNS Text Attack | Akamai

1
akamai’s [state of the internet] / Security Bulletin
TLP: GREEN 11.11.14 GSI ID: 1082 RISK FACTOR - MEDIUM
SECURITY BULLETIN: CRAFTED DNS
TEXT ATTACK
1.1 OVERVIEW / PLXsert has been monitoring a new trend in the use of DNS
amplification attacks. Amplification attacks are special types of DDoS attacks that are
designed to generate large response packets with relatively small requests. Attackers are
crafting large DNS TXT (text) records to increase amplification, magnifying the impact of
the attack. For example, several campaigns observed since October 4, 2014 contain
fragments of text taken from press releases issued by the White House.
PLXsert suspects that the DNS flooder tool continues to be used in these campaigns.
By crafting their own TXT records, attackers can amplify responses as desired and direct
this traffic to targeted sites, including—but not limited to—DNS servers. The amplified
traffic response could eventually overwhelm the targeted site and render it unable to
respond to any requests.
Attackers have used large TXT records in reflection attacks in the past. Previous victims of
DNS amplification attacks using TXT records include sites such as isc.org and many
.gov sites. With this new threat, malicious actors are now crafting the TXT records to
provide the largest response size possible, thereby having as much impact as possible.
The TXT records in the October 2014 attacks have been identified as originating from the
guessinfosys.com domain.
1.2 HIGHLIGHTED ATTRIBUTES
Attack statistics
§
Peak bandwidth: 4.3 Gigabits per second (Gbps)
§
Attack vectors: DNS reflection and amplification
§
Source port(s): 53
§
Destination port(s): 80, random
1 1
2
akamai’ s [state of the internet] / Security Bul letin
Primary targets
§
Entertainment
§
Education
§
High tech consulting
Figure 1: The entertainment industry was the main target of the October 2014 DNS reflection attacks. Sample payloads
21:38:55.972524 IP X.X.X.X.53 > X.X.X.X.52967: 5856 13/0/3 A 50.63.202.58, NS
ns71.domaincontrol.com., NS ns72.domaincontrol.com., SOA, MX mailstore1.secureserver.net.
10, MX smtp.secureserver.net. 0, TXT "President Obama is taking action to help ensure
opportunity for all Americans. President Obama Signing <snip>
13:43:36.094522 IP X.X.X.X.53 > X.X.X.X.52506: 11532 10/13/16 TXT "Presidenftxt
Obama is taking action <snip> ", TXT[|domain]
13:43:36.094854 IP X.X.X.X.53 > X.X.X.X.5926: 35408 10/13/16 TXT
"<snip> President also outlines" " the details about the
transmission and treatment of Ebola", TXT[|domain]
2 2
3
akamai’ s [state of the internet] / Security Bul letin
guessinfosys.com.
85964
IN
TXT
"President Obama is taking action to help
ensure opportunity for all Americans. President Obama Signing Legislation My Front Porch
Americans across thePresident Obama is taking action to help ensure opportunity for all
Americans. President Obama Signing Le" "gislation My Front Porch Americans across the"
guessinfosys.com.
85964
IN
TXT
"Presidentxt Obama is taking action to help
ensure opportunity for all Americans. President Obama Signing Legislation My Front Porch
Americans across thePresident Obama is taking action to help ensure opportunity for all
Americans. President Obama Signing " "Legislation My Front Porch Americans across the"
guessinfosys.com.
85964
IN
TXT
"Presidenftxt Obama is taking action to help
ensure opportunity for all Americans. President Obama Signing Legislation My Front Porch
Americans across thePresident Obama is taking action to help ensure opportunity for all
Americans. President Obama Signing" " Legislation My Front Porch Americans across the"
guessinfosys.com.
85964
IN
TXT
"In a video released this morningIn a video
released this morningIn a video released this morningIn a video released this morningIn a
video released this morningIn a video released this morningIn a video released this
morningIn a video released this mornin" "gIn a video released this morningIn a video
released this morning, President Obama addresses the people of West Africa about the Ebola
outbreak that is currently affecting the countries of Liberia, Sierra Leone, Guinea, and
Nigeria.The President reiterate" "s in the video that, along with our partners around the
world, the United States is working with these countries' governments to help stop the
disease. The first step in this fight, however, is knowing the facts -- which is why the
President also outlines" " the details about the transmission and treatment of Ebola"
guessinfosys.com.
85964
IN
TXT
"In a video rIn a video released this
morningeleased this morningIn a video released this morningIn a video released this
morningIn a video released this morningIn a video released this morningIn a video released
this morningIn a video released this mornin" "gIn a video released this morningIn a video
released this morningIn a video released this morningIn a video released this morning"
guessinfosys.com.
85964
IN
TXT
"In a viddeo rIn a video released this
morningeleased this morningIn a video released this morningIn a video released this
morningIn a video released this morningIn a video released this morningIn a video released
this morningIn a video released this morni" "ngIn a video released this morningIn a video
released this morningIn a video released this morningIn a video released this morning"
guessinfosys.com.
85964
IN
TXT
"In a viddeo frIn a video released this
morningeleased this morningIn a video released this morningIn a video released this
morningIn a video released this morningIn a video released this morningIn a video released
this morningIn a video released this morn" "ingIn a video released this morningIn a video
released this morningIn a video released this morningIn a video released this morning"
Figure 2: Dig results for guessinfosys.com TXT records show multiple TXT strings lifted from White House press releases Malicious requests for guessinfosys.com can be observed in the wild on an ongoing b asis. These requests attempt to use open resolvers as intermediate victims to reflect attack traffic back to a target. For the most part, the usefulness of these malicious domains d rops off after a few days as server admins begin to block off the requests. 3 3
4
akamai’ s [state of the internet] / Security Bul letin
18:11:32.433099 IP X.X.X.X.16484 > X.X.X.X.53: 37834+ [1au] ANY? guessinfosys.com. (45)
[email protected].......)#(......
Figure 3: A guessinfosys.com request attempting to reflect traffic off a customer DNS server Figure 4: The October 2014 crafted DNS TXT amplification attacks lasted more than five hours during each attack and peaked at more than 15 hours on October 24 1.3 MITIGATION / DNS reflection and amplification attacks make use of the same tactics
used by other types of reflection campaigns, such as SNMP, SSDP or CHARGEN. The
primary impact to the targeted service is the overall bandwidth generated. DNS reflection
attacks can be mitigated successfully at the network edge. An access control list (ACL)
would suffice but only in cases where available bandwidth exceeds attack size. Some DNS
servers will attempt to retry the response using TCP, but when the request is sent to the
target host, no transfer will occur and the attempt will fail. DDoS cloud-based protection
services such as the one provided by Akamai Technologies are recommended.
Status: PLXsert is currently monitoring ongoing campaigns. Future advisories and
updates will be provided if warranted.
4 4
5
akamai’ s [state of the internet] / Security Bul letin
ABOUT PROLEXIC SECURITY ENGINEERING & RESEARCH TEAM
(PLXSERT ) / PLXsert monitors malicious cyber threats globally and analyzes these
attacks using proprietary techniques and equipment. Through research, digital
forensics and post-event analysis, PLXsert is able to build a global view of security
threats, vulnerabilities and trends, which is shared with customers and the security
community. By identifying the sources and associated attributes of individual attacks,
along with best practices to identify and mitigate security threats and vulnerabilities,
PLXsert helps organizations make more informed, proactive decisions.
ABOUT AKAMAI / Akamai® is the leading provider of cloud services for delivering,
optimizing and securing online content and business applications. At the core of the
Company’s solutions is the Akamai Intelligent Platform™ providing extensive reach,
coupled with unmatched reliability, security, visibility and expertise. Akamai removes
the complexities of connecting the increasingly mobile world, supporting 24/7
consumer demand, and enabling enterprises to securely leverage the cloud. To learn
more about how Akamai is accelerating the pace of innovation in a hyperconnected
world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.
The Prolexic Security Engineering and Research Team (PLXsert) monitors malicious cyber threats globally and analyzes these attacks using proprietary techniques and equipment.
Through research, digital forensics and post-event analysis, PLXsert is able to build a global view of security threats, vulnerabilities and trends, which is shared with customers and the
security community. By identifying the sources and associated attributes of individual attacks, along with best practices to identify and mitigate security threats and vulnerabilities, PLXsert
helps organizations make more informed, proactive decisions.
Akamai® is a leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the company’s solutions is the Akamai
Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly
mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a
hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.
Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 40 offices around the world. Our services and renowned customer care enable
businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers and contact information for all locations are listed on
www.akamai.com/locations
©2014 Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai
wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as
of its publication date; such information is subject to change without notice. Published 10/14.
5