- Jun 24, 2016
- 636
Two-fifths of business networks show evidence of DNS tunnelling -
the latest security report from network control firm Infoblox reveals..
SOURCE: computerweekly.com
DNS tunnelling is a technique used to send and receive data packets over the domain name system (DNS) that is designed to translate domain names such as computerweekly.com into IP addresses such as 206.19.49.154, and consequently has no inherent security or monitoring capability...
[IMAGE: Wikimedia.org (reuse permitted)]
DNS tunnelling activity is a significant security threat that can indicate malware or data exfiltration within a network, according to the company’s security assessment report for the second quarter of 2016.
The report said 559 files capturing DNS traffic were uploaded to Infoblox for assessment from 248 customers across a wide range of industries and geographies. Evidence of suspicious DNS activity, such as attempting to reach known malicious internet locations, was present in 66% of the files.
The prevalence of DNS tunnelling is one of the trends that stands out in the quarter, the report said, noting that cyber criminals know that DNS is a well-established and trusted protocol, and that many organisations do not examine their DNS traffic for malicious activity.
DNS tunnelling enables cyber criminals to insert malware or pass stolen information into DNS queries, creating a covert communication channel that bypasses most firewalls, the report said.
While there are quasi-legitimate uses of DNS tunnelling, many instances are malicious. There are several off-the-shelf tunnelling toolkits readily available on the internet that enable cyber criminals with relatively little technical expertise to mount DNS tunnelling attacks...
Free & Public DNS Servers (Valid August 2016):
SOURCE: pcsupport.about.com
Provider: / Primary DNS Server / Secondary DNS Server
Level3: / 209.244.0.3 / 209.244.0.4
Verisign: / 64.6.64.6 / 64.6.65.6
Google: / 8.8.8.8 / 8.8.4.4
DNS.WATCH: / 84.200.69.80 / 84.200.70.40
Comodo Secure DNS: / 8.26.56.26 / 8.20.247.20
OpenDNS Home: / 208.67.222.222 / 208.67.220.220
DNS Advantage: / 156.154.70.1 / 156.154.71.1
Norton ConnectSafe: / 199.85.126.10 / 199.85.127.10
GreenTeamDNS: / 81.218.119.11 / 209.88.198.133
SafeDNS: / 195.46.39.39 / 195.46.39.40
OpenNIC: / 162.211.64.20 / 199.195.249.174
SmartViper: / 208.76.50.50 / 208.76.51.51
Dyn: / 216.146.35.35 / 216.146.36.36
FreeDNS: / 37.235.1.174 / 37.235.1.177
Alternate DNS: / 198.101.242.72 / 23.253.163.53
Yandex.DNS: / 77.88.8.8 / 77.88.8.1
the latest security report from network control firm Infoblox reveals..
SOURCE: computerweekly.com
DNS tunnelling is a technique used to send and receive data packets over the domain name system (DNS) that is designed to translate domain names such as computerweekly.com into IP addresses such as 206.19.49.154, and consequently has no inherent security or monitoring capability...
[IMAGE: Wikimedia.org (reuse permitted)]
DNS tunnelling activity is a significant security threat that can indicate malware or data exfiltration within a network, according to the company’s security assessment report for the second quarter of 2016.
The report said 559 files capturing DNS traffic were uploaded to Infoblox for assessment from 248 customers across a wide range of industries and geographies. Evidence of suspicious DNS activity, such as attempting to reach known malicious internet locations, was present in 66% of the files.
The prevalence of DNS tunnelling is one of the trends that stands out in the quarter, the report said, noting that cyber criminals know that DNS is a well-established and trusted protocol, and that many organisations do not examine their DNS traffic for malicious activity.
DNS tunnelling enables cyber criminals to insert malware or pass stolen information into DNS queries, creating a covert communication channel that bypasses most firewalls, the report said.
While there are quasi-legitimate uses of DNS tunnelling, many instances are malicious. There are several off-the-shelf tunnelling toolkits readily available on the internet that enable cyber criminals with relatively little technical expertise to mount DNS tunnelling attacks...
[To read the full article please visit computerweekly.com]
Free & Public DNS Servers (Valid August 2016):
SOURCE: pcsupport.about.com
Provider: / Primary DNS Server / Secondary DNS Server
Level3: / 209.244.0.3 / 209.244.0.4
Verisign: / 64.6.64.6 / 64.6.65.6
Google: / 8.8.8.8 / 8.8.4.4
DNS.WATCH: / 84.200.69.80 / 84.200.70.40
Comodo Secure DNS: / 8.26.56.26 / 8.20.247.20
OpenDNS Home: / 208.67.222.222 / 208.67.220.220
DNS Advantage: / 156.154.70.1 / 156.154.71.1
Norton ConnectSafe: / 199.85.126.10 / 199.85.127.10
GreenTeamDNS: / 81.218.119.11 / 209.88.198.133
SafeDNS: / 195.46.39.39 / 195.46.39.40
OpenNIC: / 162.211.64.20 / 199.195.249.174
SmartViper: / 208.76.50.50 / 208.76.51.51
Dyn: / 216.146.35.35 / 216.146.36.36
FreeDNS: / 37.235.1.174 / 37.235.1.177
Alternate DNS: / 198.101.242.72 / 23.253.163.53
Yandex.DNS: / 77.88.8.8 / 77.88.8.1