Tidy up your DNS!
Exploitation of 'dangling' DNS records is the latest cybercrime trend
Exploitation of 'dangling' DNS records is the latest cybercrime trend
Big organisations often create special websites and applications to go with projects and campaigns they're running. Many of these resources are only used for a short time, then taken down once the project or campaign is over. However, it's not unusual for the associated DNS records to get overlooked and left in place. Known as 'dangling' DNS records, these neglected references might seem quite harmless, but can pose a serious security risk if crooks later get hold of the domains they point to. How does that happen, and what can you do to stop your organisation getting caught out?
A dangling DNS record is one that points to a non-existent or unusable resource. They arise when an application or website is taken down, but the associated DNS record isn't updated. The existence of these records can create security risks, which vary according to the type of record involved. A simple example is an MX record. That's a record that defines where e-mail for a particular domain should be delivered. If cybercriminals take over the destination specified in a dangling record, they cause a lot of trouble by:
Intercepting e-mail intended for a legitimate organisation
Redirecting traffic that's meant for a legitimate website to a malware distribution site
Hosting a phishing site from a 'trusted' domain
Exploiting the good reputation that an organisation and its primary domain have with Google to get a better search ranking for malicious content
A recent study by CSC Global found that 21 per cent of all DNS records are dangling. The published study data doesn't include information about the incidence of abuse. Nevertheless, anecdotal evidence suggests that scammers are mainly interested in organisations that leave DNS records pointing to cloud service providers. The reason being that many such providers, including Cloudflare, allow the re-registration of 'used' host names. By re-registering a used name, a scammer can give a visitor the impression they're dealing with a bona fide organisation's server, when that server hasn't actually been in use for some time.
An organisation can do various things to prevent dangling DNS records. The first and most obvious is DNS housekeeping: regularly go through your DNS records looking for and removing any dangling records. A number of DNS monitoring tools are also available, which can flag up changes to DNS records and suspicious activities. Finally, it's good practice to make sure that proper arrangements for subsequently tidying up DNS records are made whenever a new website or online application is created.
Dangling DNS records are a serious problem that can give rise to major security risks. It's therefore important to be aware of the dangers, and to take a proactive approach to protection. Want to know more? Check out this article.