Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/6/2019
10:00 AM
Ronan David
Ronan David
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Why Businesses Fail to Address DNS Security Exposures

Increasing awareness about the critical importance of DNS security is the first step in improving the risk of being attacked. It's time to get proactive.

US businesses are hemorrhaging — bleeding money, data, time, reputation, and more — because they continue to experience cyberattacks at the DNS level. This is according to our annual "Global DNS Threat Report," which looks at the causes and effects of DNS attacks on businesses across the world.

DNS attacks are on the rise and literally costing millions. The report, which was conducted in partnership with IDC, revealed the worst trends in its five-year history. Businesses averaged more than nine DNS attacks in 2018, an increase of 34% year-over-year. Costs went up significantly, too — the average cost of a DNS attack came in at $1.27 million worldwide. When 70% percent of businesses in America were attacked, they lost per incident upward of $100,000. Almost half (48%) lost at least $500,000, and close to 10% lost over $5 million.

These costs are not sustainable. Neither is the time it takes to fix an issue — an entire business day in most cases. Companies can't afford to take any part of their business offline for over eight hours. The repercussions can be disastrous. In most instances, in-house applications were the most affected (65% of the time), though almost half of respondents (45%) had their website compromised and one-quarter (27%) experienced downtime as a direct consequence. These could all lead to serious Network and Information Security Directive penalties.

The types of attacks are also shifting. Once flooding the DNS mostly with large, high-traffic attacks to a targeted network in an effort to overwhelm its bandwidth, cybercriminals have shifted to be equal opportunity attackers and diversified their approach to include more stealth, low bandwidth tactics, such as phishing and malware-based attacks into the mix.

As attackers get smarter, why do businesses continue to fail when it comes to prioritizing DNS security? First, lack of awareness. Over a quarter of US organizations continue to think that protecting DNS is only moderately important, but the reality is that DNS is critical to service continuity, data confidentiality, and security. By nature, DNS is an open service to the network, and its mission-critical role for routing application access makes it both a primary attack vector and a target for hackers. Eighty-two percent of global businesses suffered a DNS attack last year, and DNS attack numbers are in the double digits for many.

The bottom line: When the DNS is affected, so are the applications that run a business. Imagine that a large manufacturer loses access to its supply chain management system — a chain reaction is set off that could affect the entire company.

Second, adaptive countermeasures aren't properly in place. When under attack, companies can't shut down the entire business, but they can contain the risk. Retaining service, availability, bandwidth, and control — all elements crucial to network integrity — are a must. Disaster recovery and avoiding single points of failure must be part of the mitigation process. This is where adopting a zero-trust strategy is critical.

Organizations need to take a micro rather than a macro approach. Perimeter security is not enough, especially when most threats come from inside of the enterprise network in the form of malware and phishing invitations. Businesses are getting better at building intermediate zones to allow and control inbound flows, but this enterprise network security topology relies on macro-segmentation principles that are no longer appropriate. The architecture must be scaled down into micro segments — as small as a single client or server. This requires an entire re-imagining of the network, relying on the fact that there are no longer any trusted or untrusted zones. Everything is treated as a threat as a default.

Having a granular view of users and applications becomes a standard approach, not an exception. Almost all Internet connections are initiated through DNS, meaning DNS sees 95% of traffic going through the network. Analyzing the behavior of each user brings valuable data for detecting potential menaces hidden in the traffic. This surveillance of each client at such a detailed level is key to successful zero-trust strategy. Plus, administrators also should know the status of the network in real time at all times.

Increasing awareness about the critical importance of DNS security is the first step in improving the risk of being attacked. Moving to a more proactive approach will add even more protection. No business can afford to hemorrhage money — that's management 101. It also can't afford to lose precious data, experience time offline, and reputation, all three of which lead to lost revenue. Addressing DNS weaknesses now will help keep companies solvent in the future. 

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "8 Ways to Spot an Insider Threat."

Ronan David develops the strategic direction for EfficientIP, which delivers fully integrated network security and automated solutions for DDI (DNS-DHCP-IPAM). He oversees EfficientIP's customer and partner relationships, resulting in corporate growth and development within ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RonanDavid
50%
50%
RonanDavid,
User Rank: Author
9/10/2019 | 12:09:10 PM
Re: I do think there needs to be more clarity as to how to address this problem

Thanks for your comment. The main purpose of the article is to shed some light on the DNS as a perfect tool to help increase security for enterprises. As part of the zero-trust approach, DNS can help in segmenting the application access and have a detailed view of the intent of user clients.

DNSSEC is effectively a good way to add integrity control on the DNS information transported. DNS over TLS would bring confidentiality at the transport level, but clients need to be updated first in the operating systems.

Flow analysis with advanced methods like neural networks or clustering is also an approach to look at. We at EfficientIP are investing a lot in these directions to increase our detection ability of bad domains (such as zero-day malicious domains or DGA) and non-conforming behavior of applications.

Trusting the DNS providers is probably not enough in the space of the enterprise. The distributed model of the DNS is not easy to centralize (nor a good option for Internet service continuity). Enterprises have not (and will not) moved all their workloads and data into cloud infrastructures- some require a higher level of control on their resources, some are not trusting providers for data security. Internal enterprise DNS is still a perfect way to increase security with filtering, segmenting the access to application and analyzing user behaviors. Feeding SIEM with events from the DNS, and some logs in special circumstances, provides a good way to enhance security for enterprise assets and data as a whole. This is the main purpose of security in IT.

tdsan
50%
50%
tdsan,
User Rank: Ninja
9/6/2019 | 4:30:22 PM
I do think there needs to be more clarity as to how to address this problem

Having a granular view of users and applications becomes a standard approach, not an exception. Almost all Internet connections are initiated through DNS, meaning DNS sees 95% of traffic going through the network. Analyzing the behavior of each user brings valuable data for detecting potential menaces hidden in the traffic. This surveillance of each client at such a detailed level is key to successful zero-trust strategy. Plus, administrators also should know the status of the network in real time at all times. 

Ok, this is good from a novice standpoint and it explains what we need from a 50K foot view, but how do we really solve the problem. Zero-trust strategy is good but how can you be Zero-Trust when data is coming from the internet that is constantly changing.

For me, there are a few things we did to help address this problem:
  • Implemented IPv6 to run in most if not all of our environment (enable AES256 VPN ESP/AH Connections to your offsite locations)
  • Implement DNSSEC as part of your DNS solution where keys are exchanged
  • Work with companies like Infobox to help address some of your issues
  • Implement ML as part of your cybersecurity strategy at the DNS and network layers

In addition, we need the DNS providers to come up with an IPv6 token based ML solution where the system puts the errant site in a black-list. this would help address 90% of the issues because the sites could be easily identified at all levels of the network because the token or SHA256 hash could be used to create an index (ex of hash - SHA256 F2A3E9E8B019D93818202BDF3AD362F4BAEC7C64589BC635B92E3A8DFD9AD391). This could be the index for Internet sites around the globe and the process can be associated with bad actors who are sending traffic using the 9 primary DNS sites, they could create a blacklist where the actors are stopped before submitting anything to the public.

T
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15138
PUBLISHED: 2019-09-20
The html-pdf package 2.2.0 for Node.js has an arbitrary file read vulnerability via an HTML file that uses XMLHttpRequest to access a file:/// URL.
CVE-2019-6145
PUBLISHED: 2019-09-20
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs ...
CVE-2019-6649
PUBLISHED: 2019-09-20
F5 BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 and Enterprise Manager 3.1.1 may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings.
CVE-2019-6650
PUBLISHED: 2019-09-20
F5 BIG-IP ASM 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 may expose sensitive information and allow the system configuration to be modified when using non-default settings.
CVE-2014-10396
PUBLISHED: 2019-09-20
The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.