Egypt's ICT sector a government priority, creating 70,000 new jobs, says PM    Egypt's SCZONE, China discuss boosting investment in auto, clean energy sectors    Tensions escalate in Gaza as Israeli violations persist, humanitarian crisis deepens    Egypt, India explore cooperation in high-tech pharmaceutical manufacturing, health investments    Egypt, World Bank explore expanded cooperation on infrastructure, energy, water    Egypt, Sudan, UN convene to ramp up humanitarian aid in Sudan    Egypt, China's Jiangsu Fenghai discuss joint seawater desalination projects    Egypt's FRA issues first-ever rules for reinsurers to boost market oversight    LLC vs Sole Establishment in Dubai: Which is right for you?    French court grants early release to former President Nicolas Sarkozy    Egypt releases 2023 State of Environment Report    Egyptians vote in 1st stage of lower house of parliament elections    Egypt's Al-Sisi, Russian security chief discuss Gaza, Ukraine and bilateral ties    Grand Egyptian Museum welcomes over 12,000 visitors on seventh day    Egypt's private medical insurance tops EGP 13b amid regulatory reforms – EHA chair    400 children with disabilities take part in 'Their Right to Joy' marathon    Egypt repatriates 36 smuggled ancient artefacts from the US    Grand Egyptian Museum attracts 18k visitors on first public opening day    'Royalty on the Nile': Grand Ball of Monte-Carlo comes to Cairo    Egypt, Albania discuss expanding healthcare cooperation    VS-FILM Festival for Very Short Films Ignites El Sokhna    Egypt's cultural palaces authority launches nationwide arts and culture events    Egypt launches Red Sea Open to boost tourism, international profile    Qatar to activate Egypt investment package with Matrouh deal in days: Cabinet    Hungary, Egypt strengthen ties as Orbán anticipates Sisi's 2026 visit    Omar Hisham Talaat: Media partnership with 'On Sports' key to promoting Egyptian golf tourism    Egypt establishes high-level committee, insurance fund to address medical errors    Sisi expands national support fund to include diplomats who died on duty    Madinaty Golf Club to host 104th Egyptian Open    Egypt's PM reviews efforts to remove Nile River encroachments    Al-Sisi: Cairo to host Gaza reconstruction conference in November    Egypt will never relinquish historical Nile water rights, PM says    Al-Sisi, Burhan discuss efforts to end Sudan war, address Nile Dam dispute in Cairo talks    Egypt resolves dispute between top African sports bodies ahead of 2027 African Games    Germany among EU's priciest labour markets – official data    Paris Olympic gold '24 medals hit record value    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Russia says it's in sync with US, China, Pakistan on Taliban    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Companies in Egypt need to secure DNS infrastructure against malicious domains
Published in Amwal Al Ghad on 05 - 03 - 2017

The constant creation of malicious domains has proved a cat and mouse game for threat researchers and cybercriminals. Across the world, new malicious domains are constantly being created from which cybercriminals can launch attacks against businesses' Domain Name System (DNS) infrastructure.
During what is known as the ‘planting' phase, the Infoblox DNS Threat Index, which monitors the creation of such domains, shows a significant increase in the number of malicious domains associated with malware and exploit kits.
In the second ‘harvesting' phase, the attackers begin to reap the bounty from these newly created malicious domains, launching attacks on organisations' DNS to exfiltrate data or just to wreak havoc on their victims.
Exploit kit popularity persists
A great amount of this malicious infrastructure is being used in the creation of exploit kits. This particularly disturbing category of malware is part of a growing trend of off-the-shelf, user-friendly cybercrime tools.
These tool-kits-for-hire deliver malware via drive-by download, ultimately providing cybercriminals with an opportunity to wreak great havoc on an organisation with little or no technical knowledge. Indeed, attackers using exploit kits don't need to understand how they create or deliver the exploit needed to infect a server, and the attack itself is often facilitated by a user-friendly interface featured in the kits itself to help hackers manage and monitor their malware campaign. All of this ultimately serves to lower the technical bar for sowing malware.
It is therefore unsurprising that exploit kits have cemented their place as a popular motive for malicious domain creation.
Angler continues to reign as the most popular exploit kit. Indeed, just recently Perez Hilton, the celebrity gossip website, was hacked, redirecting its visitors to the Angler landing page which in turn exposed users to CryptXXX ransomware.
Achieving its malicious goals
These tool kits generally exploit vulnerabilities or security flaws in operating systems, browsers, and popular software such as Adobe Flash and Java. Then, just as in the Perez Hilton case, users are exposed to the kits (and their payloads) via malvertising and spam on the compromised websites.
When an exploit is successful in delivering its payload onto a victim's device, it is then able to operate behind the service provider's or company's firewall. This malware can then spread across the internal network to other devices, as well as communicating back to its command-and-control (C&C) server, which enables it to download more malicious software or exfiltrate data. Often the organisation's own DNS is used to facilitate communication between the infected device and its C&C server.
Like all command and control malware, phishing and many other threats, exploit kits use DNS to achieve their ultimate aim, whether that is data exfiltration or mass malware infection. For that reason, it has never been more important for organisations to protect their DNS infrastructure.
Securing DNS infrastructure
While DNS infrastructure is inherently a vulnerable component for organisations, effective internal DNS security solutions can turn it into a great asset for securing an organisation's networks and data. And this is possible without having to change the existing network architecture.
Using DNS response policy zones (RPZs) on internal DNS, combined with an up-to-date threat intelligence feed of malicious destinations, enables DNS appliance to intercept those DNS queries which are associated with known malware. This effectively prevents the threat from communicating with its external C&C servers to wreak further havoc: preventing both data exfiltration using standard network protocols and malware from breeding in the network.
Furthermore, internal DNS security can identify and prevent data exfiltration using DNS tunnelling techniques by establishing query thresholds. This benchmark then enables the DNS to detect and flag any unusually large queries or responses which may contain packets of data.
With the wealth of intelligence that can be garnered both on the types of threats facing DNS infrastructure and on the malicious domains being created to exploit it, organisations in Egypt can take effective steps to prevent attack vectors from exploiting this infrastructure. And as the technical bar is lowered for attacks, as with exploit kits, whose popularity will only rise, DNS security will only become ever-more crucial.
Inherently vulnerable, yet with great potential: no organisation should overlook this vital component of network architecture and leave it unprotected. DNS is capable of being an important defence against exploit kits and other attack vectors which rely on it to achieve their criminal aims.
About the Writer:
Ashraf Sheet is a Regional Director MEA at Infoblox.
This column does not necessarily reflect the opinion of the editorial board or Bloomberg LP and its owners.


Clic here to read the story from its source.