Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417864
|View full text |Cite
|
Sign up to set email alerts
|

Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Similarly, abandoned banking domains have been used to target users who attempted to connect to those banks [13]. More recent research has shown how stale NS records for an active domain can serve as reactivated zombies in a resolver's cache [2].…”
Section: Ghost Domainsmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, abandoned banking domains have been used to target users who attempted to connect to those banks [13]. More recent research has shown how stale NS records for an active domain can serve as reactivated zombies in a resolver's cache [2].…”
Section: Ghost Domainsmentioning
confidence: 99%
“…We developed a prototype implementation of our contributions by extending the prototype Firefox WebExtension already publically available [21]. The extension is available for download 2 .…”
Section: Figure 1: An Example Sattestation In Json Formatmentioning
confidence: 99%
“…For this study, we use the Tranco list from 14 December 2020. 1 We evaluate our methodology on a subset of the Tranco list, consisting of a random sample of 100,000 domains taken from the top 500,000 ranked domains. The exact list of domains is available at our open source repository.…”
Section: Input Data Setsmentioning
confidence: 99%
“…Borgolte et al [6] investigated how DNS records pointing to cloud IP addresses can lead to domain takeover attacks because IP address use-after-free attacks on cloud infrastructure and they show that these attacks are practical and cost effective to execute on public clouds. Stale NS record types have been studied by Alowaisheq et al [1], who show how they can be exploited via DNS hosting providers, possibly allowing domain hijacking for 628 domains of the Alexa's 1M. Beyond DNS, Gruss et al [16] show that use-after-free attacks can also apply to email addresses.…”
Section: Orphaned Resourcesmentioning
confidence: 99%
“…Furthermore, attackers have been found employing a technique called domain shadowing [7,32] to illicitly access the DNS control panel of active domains to distribute malware from arbitrary subdomains. Alowaisheq et al recently discovered that stale NS records [4] could be also abused by attackers to take control of the DNS zone of a domain to create arbitrary DNS records. Controlling the DNS of a domain is the highest privileged setting for a related-domain attackers, since they can point subdomains to hosts they fully control and reliably obtain TLS certificates.…”
Section: Compromised Hosts/websitesmentioning
confidence: 99%