Monday, October 7, 2024
HomeComputer SecurityHalf a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack...

Half a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack – A Remote Network Control Attack

Published on

A new researcher revealed that Half a Billion home and enterprise based devices IoT Devices are vulnerable to DNS Rebinding Attack including IP phones, printers, networking equipment, and cameras.

DNS Rebinding Attack taking advantage of the outdated web browsers that allow to redirect victims to the malicious domain and compromise the network where it uses the network firewall web browser as a proxy to communicate with vulnerable local network devices.

The old report that referred in last week revealed that just million of Devices are vulnerable to this DNS Rebinding Attack but this new research uncovered the issue impacts hundreds of millions of IoT inside of the many of enterprise network.

- Advertisement - EHA

This new flaw impacts a lot of enterprise network which leads to an attacker to perform data exfiltration and take-over for a Mirai-like attack.

The same Security firm was discovered one of the highly critical Bluetooth based BlueBorne vulnerability in last year.

Almost All IoT Device Model’s are Vulnerable

Based on the investigation result, almost major enterprises are open to DNS rebinding attacks including commonly used IoT devices inside of the enterprise environments also vulnerable.

Based on the above statistics, At least one 1 vulnerable IoT devices are used by all the enterprise network, so almost every enterprise IoT infrastructure is vulnerable to DNS Rebinding Attack.

The printer is one of the least managed IoT devices in most of the enterprise typically deploy printers with default settings which could be one the main loophole for an attacker to compromise the target and exfiltrates information by downloading documents scanned, stored, or cached on the printer.

Armis research team revealed that, the estimated number of vulnerable devices worldwide in the enterprise – nearly half a billion(496 million) devices.

Enterprise networks should use best IDS, IPS protection system to keep their network safe and secure from IoT based attacks.

How does this DNS Rebinding Attack Works

1. Initially, this attack started via Phishing email that used to compromise users and takes him or her to a malicious site which contains malicious Javascript to run on the victims local browser.

In this case, attackers using an obfuscation technique to avoid detection by a firewall, network security solution, or even endpoint protection

2. Scan the local network to detect the presence of a particular type of IoT device which can accomplish by DNS rebinding and JavaScript and the malicious command will scan the local IP address and send back to the malicious website.

3. The malicious website sends an appropriate set of commands to the end user’s browser — for example, commands to log into the HTTP web server of a security camera on the internal network.

4. Using DNS rebinding Browser can able to sends those commands directly to the IP address owned IoT device inside of the targeted organization.

5. Establish an outbound connection to a C&C server, directly from the compromised IoT/unmanaged device since the firewall typically considers outbound connections to be safe.

Mitigation:

Placing a web-application firewall can filter out the malicious Backdoor shell access and isolate the browser based attacks.

Implement the highly recommended Imperva Incapsula backdoor shell protection to avoid attacker control the vulnerable device remotely.

Protect your web applications from vulnerabilities with Worlds best WAF solutions.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new...

CISA Warns of Four Vulnerabilities that Exploited Actively in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has warned about four critical vulnerabilities currently...

Open Source C3 Frameworks Used In Red Teaming Assessments Vulnerable To RCE Attacks

C2 frameworks, crucial for post-exploitation operations, offer open-source alternatives to Cobalt Strike. They streamline...