Tuesday, November 19, 2024
HomeComputer SecurityHalf a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack...

Half a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack – A Remote Network Control Attack

Published on

A new researcher revealed that Half a Billion home and enterprise based devices IoT Devices are vulnerable to DNS Rebinding Attack including IP phones, printers, networking equipment, and cameras.

DNS Rebinding Attack taking advantage of the outdated web browsers that allow to redirect victims to the malicious domain and compromise the network where it uses the network firewall web browser as a proxy to communicate with vulnerable local network devices.

The old report that referred in last week revealed that just million of Devices are vulnerable to this DNS Rebinding Attack but this new research uncovered the issue impacts hundreds of millions of IoT inside of the many of enterprise network.

- Advertisement - SIEM as a Service

This new flaw impacts a lot of enterprise network which leads to an attacker to perform data exfiltration and take-over for a Mirai-like attack.

The same Security firm was discovered one of the highly critical Bluetooth based BlueBorne vulnerability in last year.

Almost All IoT Device Model’s are Vulnerable

Based on the investigation result, almost major enterprises are open to DNS rebinding attacks including commonly used IoT devices inside of the enterprise environments also vulnerable.

Based on the above statistics, At least one 1 vulnerable IoT devices are used by all the enterprise network, so almost every enterprise IoT infrastructure is vulnerable to DNS Rebinding Attack.

The printer is one of the least managed IoT devices in most of the enterprise typically deploy printers with default settings which could be one the main loophole for an attacker to compromise the target and exfiltrates information by downloading documents scanned, stored, or cached on the printer.

Armis research team revealed that, the estimated number of vulnerable devices worldwide in the enterprise – nearly half a billion(496 million) devices.

Enterprise networks should use best IDS, IPS protection system to keep their network safe and secure from IoT based attacks.

How does this DNS Rebinding Attack Works

1. Initially, this attack started via Phishing email that used to compromise users and takes him or her to a malicious site which contains malicious Javascript to run on the victims local browser.

In this case, attackers using an obfuscation technique to avoid detection by a firewall, network security solution, or even endpoint protection

2. Scan the local network to detect the presence of a particular type of IoT device which can accomplish by DNS rebinding and JavaScript and the malicious command will scan the local IP address and send back to the malicious website.

3. The malicious website sends an appropriate set of commands to the end user’s browser — for example, commands to log into the HTTP web server of a security camera on the internal network.

4. Using DNS rebinding Browser can able to sends those commands directly to the IP address owned IoT device inside of the targeted organization.

5. Establish an outbound connection to a C&C server, directly from the compromised IoT/unmanaged device since the firewall typically considers outbound connections to be safe.

Mitigation:

Placing a web-application firewall can filter out the malicious Backdoor shell access and isolate the browser based attacks.

Implement the highly recommended Imperva Incapsula backdoor shell protection to avoid attacker control the vulnerable device remotely.

Protect your web applications from vulnerabilities with Worlds best WAF solutions.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Phobos Ransomware Admin as Part of International Hacking Operation

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian...

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution,...