Monday, February 10, 2025
HomeComputer SecurityHalf a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack...

Half a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack – A Remote Network Control Attack

Published on

SIEM as a Service

Follow Us on Google News

A new researcher revealed that Half a Billion home and enterprise based devices IoT Devices are vulnerable to DNS Rebinding Attack including IP phones, printers, networking equipment, and cameras.

DNS Rebinding Attack taking advantage of the outdated web browsers that allow to redirect victims to the malicious domain and compromise the network where it uses the network firewall web browser as a proxy to communicate with vulnerable local network devices.

The old report that referred in last week revealed that just million of Devices are vulnerable to this DNS Rebinding Attack but this new research uncovered the issue impacts hundreds of millions of IoT inside of the many of enterprise network.

This new flaw impacts a lot of enterprise network which leads to an attacker to perform data exfiltration and take-over for a Mirai-like attack.

The same Security firm was discovered one of the highly critical Bluetooth based BlueBorne vulnerability in last year.

Almost All IoT Device Model’s are Vulnerable

Based on the investigation result, almost major enterprises are open to DNS rebinding attacks including commonly used IoT devices inside of the enterprise environments also vulnerable.

Based on the above statistics, At least one 1 vulnerable IoT devices are used by all the enterprise network, so almost every enterprise IoT infrastructure is vulnerable to DNS Rebinding Attack.

The printer is one of the least managed IoT devices in most of the enterprise typically deploy printers with default settings which could be one the main loophole for an attacker to compromise the target and exfiltrates information by downloading documents scanned, stored, or cached on the printer.

Armis research team revealed that, the estimated number of vulnerable devices worldwide in the enterprise – nearly half a billion(496 million) devices.

Enterprise networks should use best IDS, IPS protection system to keep their network safe and secure from IoT based attacks.

How does this DNS Rebinding Attack Works

1. Initially, this attack started via Phishing email that used to compromise users and takes him or her to a malicious site which contains malicious Javascript to run on the victims local browser.

In this case, attackers using an obfuscation technique to avoid detection by a firewall, network security solution, or even endpoint protection

2. Scan the local network to detect the presence of a particular type of IoT device which can accomplish by DNS rebinding and JavaScript and the malicious command will scan the local IP address and send back to the malicious website.

3. The malicious website sends an appropriate set of commands to the end user’s browser — for example, commands to log into the HTTP web server of a security camera on the internal network.

4. Using DNS rebinding Browser can able to sends those commands directly to the IP address owned IoT device inside of the targeted organization.

5. Establish an outbound connection to a C&C server, directly from the compromised IoT/unmanaged device since the firewall typically considers outbound connections to be safe.

Mitigation:

Placing a web-application firewall can filter out the malicious Backdoor shell access and isolate the browser based attacks.

Implement the highly recommended Imperva Incapsula backdoor shell protection to avoid attacker control the vulnerable device remotely.

Protect your web applications from vulnerabilities with Worlds best WAF solutions.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

NetSupport RAT Grant Attackers Full Access to Victims Systems

The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving...

Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers

QR codes, once a symbol of convenience and security in digital interactions, have become...

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique...

SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account

A severe security vulnerability, tracked as CVE-2025-23369, has been identified in GitHub Enterprise Server...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account

A severe security vulnerability, tracked as CVE-2025-23369, has been identified in GitHub Enterprise Server...

Marvel Game Vulnerability Exposes PCs & PS5s to Remote Takeover Attacks

A severe security vulnerability has been uncovered in the popular video game Marvel Rivals, raising...

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data

Serious vulnerabilities in Zimbra Collaboration Suite (ZCS), a popular enterprise email and collaboration platform,...