The first attacks that are likely to have stemmed from a serious Domain Name System flaw have been reported.

Dan Kaminsky
(Credit: Kaminsky’s blog)

The existence of the Domain Name System (DNS) flaw, which could be used to redirect browsers to malicious sites, was revealed at the start of July by security researcher Dan Kaminsky. Multiple vendors, including Microsoft and Cisco, have already issued patches to counteract any attacks.

However, code that could act as a blueprint for an attack via the flaw was published on Wednesday last week by Metasploit, which provides penetration-testing tools. On Friday last week, a user named James Kosin posted an excerpt from a server log to a Fedora Linux mailing list, claiming it proved attacks based on the DNS flaw had begun.

“The DNS attacks are starting,” read Kosin’s post. “Below is a snippet of a logwatch from last night. Be sure all DNS servers are updated if at all possible. The spooks are out in full on this security vulnerability in force. This is your last warning… Patch or upgrade now!”

Approached via email to discuss his post, Kosin appeared to retreat from saying the activity he had observed was definitely an attack. “I can’t prove or disprove any claim that it is an exploit of the flaw other than to say it started about a week ago,” he told ZDNet.com.au sister site ZDNet.co.uk. “I’d already updated the server’s DNS application, so I’m taking an educated stab in the peripheral internet here in saying it is a good possibility of being a possible exploit.”

Carl Leonard, a threat research manager for the security company Websense, who reported Kosin’s post, said his company had still not seen any attack reports in its own systems. However, he said Websense does “expect to” see such reports. “The exploit code is available and people still need to patch systems,” he said. “It’s kind of a waiting game at the moment.”

The flaw in question is inherent to the DNS – the part of the internet’s infrastructure that takes a human-readable web-address request and finds the corresponding numeric IP address. The nodes of the DNS are nameservers and, if one of those is left unpatched, the new attack code could fool the server into redirecting user requests to phishing sites or other malware-hosting sites.

Those who need to apply the patch are mostly internet service providers (ISPs) and companies that run their own nameservers. Users can check if their nameservers are vulnerable through a tool hosted on Kaminsky’s blog.

Explore More

Invisible Browsing v6.5

Invisible Browsing v6.5 Info: Invisible Browsing will hide, change or mask your IP address, letting you surf anonymously preventing your IP or other information to be collected without your permission.

What are the drawbacks of signature-based antivirus software?

Every virus cannot be detected by a signature-based antivirus largely for the following reasons: * If an attacker has changed the signature of a virus, any signature-based antivirus will not

What are cryptographic attacks?

Cryptographic attacks are methods of evading the security of a cryptographic system by finding weaknesses in such areas as the code, cipher, cryptographic protocol or key management scheme in the