A new class of DNS affecting important DNS-as-a-Service (DNSaaS) has been discovered that could allow an attacker to gain access to sensitive information from a corporate network.
This is made possible by a simple domain registration, which hijacks a DNSaaS provider’s name server, enabling it to wiretap on dynamic DNS traffic from its customers’ networks.
This was discovered by security firm Wiz researchers Shir Tamari and Ami Luttwak.
“We found a simple loophole that allowed us to intercept a portion of worldwide dynamic DNS traffic going through managed DNS providers like Amazon and Google,” the researchers said.
The data that flows through this technique ranging from the names of employees/computers and locations to highly sensitive details about the infrastructure of organizations such as Internet-exposed network devices are then used to simplify the work of a threat actor when it comes to breaking through an organization’s network.
For more information, read the <a rel=”noopener” href=”https://www.bleepingcomputer.com/news/security/new-dns-vulnerability-allows-nation-state-level-spying-on-companies/” target=”_blank”>original story</a> in BleepingComputer.