TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

The DNS Attacks We’re Still Seeing

2018-12-04 · Read original ↗

ATT&CK techniques detected

12 predictions
T1584.001Domains
81%
"network time protocol ( ntp ), or character generator protocol ( chargen ). 2 expired domain takeovers and redirection several customers reported attacks where some of their sites suddenly began redirecting to strange, disreputable websites. a normal landing page or e - commerce …"
T1498Network Denial of Service
76%
"attacks off of, so the source addresses may originate there. if the dns requests that are clogging up your internet connections aren ’ t landing on live addresses, you may see returning icmp destination unreachable messages bouncing back out from your network, which also add to t…"
T1498Network Denial of Service
75%
"outages were occurring even if a network wasn ’ t the direct target of the attack. for example, service providers still felt the effects as the dns water torture traffic passed through their networks and saturated their pipes. to pull off a dns water torture attack, an attacker l…"
T1498Network Denial of Service
67%
"and xispprkn. example. com. the bots were generating the requests as fast as they could and then flooding them in. what you can do about it the first step is to understand your dns environment : know what resolvers you have, where they are located, and what traffic load is normal…"
T1498Network Denial of Service
62%
"a ddos scraping / throttling technical solution, and / or having alerting / escalation plans for your team. as these attacks are a credible threat for most organizations, the impact of a dns outage should be quantified in terms of expected losses and reviewed with business leader…"
T1583.001Domains
57%
"network time protocol ( ntp ), or character generator protocol ( chargen ). 2 expired domain takeovers and redirection several customers reported attacks where some of their sites suddenly began redirecting to strange, disreputable websites. a normal landing page or e - commerce …"
T1071.004DNS
42%
"the dns attacks we ’ re still seeing in early 2017, even decades after its adoption, the domain name system ( dns ) is still the achilles ’ heel of the internet. this is because nearly everything on the internet requires dns, but the dns service relies on a protocol that is both …"
T1498Network Denial of Service
39%
"the dns attacks we ’ re still seeing in early 2017, even decades after its adoption, the domain name system ( dns ) is still the achilles ’ heel of the internet. this is because nearly everything on the internet requires dns, but the dns service relies on a protocol that is both …"
T1078.002Domain Accounts
35%
"happens is that organizations lose track of the domains they own and when they expire. ownership of the domain inventory process should be centralized to a single team or role, and the responsibility assigned to track and manage renewals. strong authentication and the principle o…"
T1499Endpoint Denial of Service
35%
"attacks off of, so the source addresses may originate there. if the dns requests that are clogging up your internet connections aren ’ t landing on live addresses, you may see returning icmp destination unreachable messages bouncing back out from your network, which also add to t…"
T1498.001Direct Network Flood
34%
"attacks off of, so the source addresses may originate there. if the dns requests that are clogging up your internet connections aren ’ t landing on live addresses, you may see returning icmp destination unreachable messages bouncing back out from your network, which also add to t…"
T1498.001Direct Network Flood
32%
"outages were occurring even if a network wasn ’ t the direct target of the attack. for example, service providers still felt the effects as the dns water torture traffic passed through their networks and saturated their pipes. to pull off a dns water torture attack, an attacker l…"

Summary

F5 threat intelligence reports attackers are still doing DNS water torture DDoS, DNS reflection DDoS, expired domain takeover, and using DNS requests for covert channels.