DNS Rebinding Attack

A new researcher revealed that Half a Billion home and enterprise based devices IoT Devices are vulnerable to DNS Rebinding Attack including IP phones, printers, networking equipment, and cameras.

DNS Rebinding Attack taking advantage of the outdated web browsers that allow to redirect victims to the malicious domain and compromise the network where it uses the network firewall web browser as a proxy to communicate with vulnerable local network devices.

The old report that referred in last week revealed that just million of Devices are vulnerable to this DNS Rebinding Attack but this new research uncovered the issue impacts hundreds of millions of IoT inside of the many of enterprise network.

This new flaw impacts a lot of enterprise network which leads to an attacker to perform data exfiltration and take-over for a Mirai-like attack.

The same Security firm was discovered one of the highly critical Bluetooth based BlueBorne vulnerability in last year.

Almost All IoT Device Model’s are Vulnerable

Based on the investigation result, almost major enterprises are open to DNS rebinding attacks including commonly used IoT devices inside of the enterprise environments also vulnerable.

Based on the above statistics, At least one 1 vulnerable IoT devices are used by all the enterprise network, so almost every enterprise IoT infrastructure is vulnerable to DNS Rebinding Attack.

The printer is one of the least managed IoT devices in most of the enterprise typically deploy printers with default settings which could be one the main loophole for an attacker to compromise the target and exfiltrates information by downloading documents scanned, stored, or cached on the printer.

Armis research team revealed that, the estimated number of vulnerable devices worldwide in the enterprise – nearly half a billion(496 million) devices.

Enterprise networks should use best IDS, IPS protection system to keep their network safe and secure from IoT based attacks.

How does this DNS Rebinding Attack Works

1. Initially, this attack started via Phishing email that used to compromise users and takes him or her to a malicious site which contains malicious Javascript to run on the victims local browser.

In this case, attackers using an obfuscation technique to avoid detection by a firewall, network security solution, or even endpoint protection

2. Scan the local network to detect the presence of a particular type of IoT device which can accomplish by DNS rebinding and JavaScript and the malicious command will scan the local IP address and send back to the malicious website.

3. The malicious website sends an appropriate set of commands to the end user’s browser — for example, commands to log into the HTTP web server of a security camera on the internal network.

4. Using DNS rebinding Browser can able to sends those commands directly to the IP address owned IoT device inside of the targeted organization.

5. Establish an outbound connection to a C&C server, directly from the compromised IoT/unmanaged device since the firewall typically considers outbound connections to be safe.

Mitigation:

Placing a web-application firewall can filter out the malicious Backdoor shell access and isolate the browser based attacks.

Implement the highly recommended Imperva Incapsula backdoor shell protection to avoid attacker control the vulnerable device remotely.

Protect your web applications from vulnerabilities with Worlds best WAF solutions.