What is DNS & How Is It Vulnerable to Attacks?
The internet domain name system (DNS) acts as a directory for the entire web. It allows users to access web pages (everything from sports and news sites to search engines and university systems) by translating site names into a computer-recognized string of digits called IP addresses.
DNS is a simple tool that makes the web more usable for all of us. But it is not without its drawbacks. Because Internet service providers (ISPs) do not take their own responsibility for verifying the accuracy of domain-to-IP translations and because this process is largely invisible to users, DNS requests are vulnerable to attacks including:
- A Denial-of-service (DoS) attack that disables a device by overcoming it with a fake request so that a legitimate one cannot be created successfully.
- Distributed denial-of-service (DDoS) attacks, which share the same end goal as DoS attacks, but use a network made up of many devices so that it cannot be repelled by turning off traffic from a single source.
- A cache poisoning attack occurs when a cybercriminal infects a computer’s temporary storage (cache) with malicious code, and then the hacker redirects a valid DNS to that code for a specific purpose, such as installing spyware or other types of malware.
- Registrar hacking, which is a DNS-enabled attack, often stems from the account credentials of the website owner being compromised. After hacking a registered domain, cybercriminals can redirect a valid DNS request for that site to their target site.
4 Reasons Why Taking Control of Your DNS Is a Cyber Security Best Practice:
Businesses without DNS security tools provided typically rely on their Internet service provider (ISP) to resolve their DNS requests for no more than their monthly bill. However, there is actually a lot of value in that demand for ISPs and other larger internet companies. They tell the story of how we use the internet and can be very powerful when paired with machine learning technology.
But instead of donating this data blindly, DNS security tools allow users to complete requests on their own terms. In addition to added privacy, this provides some productivity and overall security benefits. General cybersecurity best practices are reinforced by strong DNS security.
- Blocking risky DNS requests. ISPs tend to take a hands-off approach to resolving DNS requests. They’re not interested in whether you’re heading to a legitimate site, or a site known to host malware. They are there to help you. DNS security tools (at least those supported by quality threat intelligence) can detect that users on the network are trying to land on a known malicious site and immediately block the visit from happening. Webroot data has found that 88% of malware can be stopped from entering a network by using this strategy.
- Lock your guest’s WiFi Network. There are parts of the internet that are not suitable to be accessed in any business. If you don’t want angry phone calls from your ISP for illegally downloading copyrighted material, or you don’t want your bandwidth reduced by patrons using file-sharing sites on your network, you can prevent it by denying DNS requests to your peers-to-peer torrenting or streaming sites. In addition to being a broadband channel, torrent sites are a hotbed for malware.
- Increase workplace productivity. Social media, fantasy sports, video streaming, there are so many distractions on the web. But as ISPs do, checking your business’s DNS requests can tell you a lot about how your network is being used, even the devices used to access it. DNS security tools are able to group sites into categories as described above and more such as gambling, adult, alcohol & tobacco, shopping and so on, and block DNS requests to those sites from being resolved as needed. They can also cover prominent ads on sites used for legitimate research or other business purposes. Finally, in addition to restricting access to certain groups of sites directly, owners can simply create usage reports to monitor how their network is being used by looking at any trends that may be problematic in the long run.
Credit to: https://bit.ly/3oLmnvl