Want To Hijack a Domain? Just Get a Fax Machine 162
msm1267 writes "Metasploit's HD Moore says hackers sent a spoofed DNS change request via fax to Register.com that the registrar accepted, leading to a DNS hijacking attack against the Metasploit and Rapid7 websites. The two respective homepages were defaced with a message left by the same hacker collective that claimed responsibility for a similar DNS attack against Network Solutions. Rapid7 said the two sites' DNS records have been locked down and they are investigating."
"hack" (Score:5, Insightful)
Social engineering is not hacking to me.
Re:"hack" (Score:5, Insightful)
What is the difference between injecting code into a machine to make it do what you want, and injecting an idea into a human to make the human do what you want.
Re:"hack" (Score:5, Funny)
Because normally by the time you are injecting code into a human, you already got what you wanted. What were we talking about again?
Re: "hack" (Score:5, Funny)
Virgin spotted
Meh. Virgin spotting on /. is like birdwatching in an aviary.
Re: (Score:2)
One is morally wrong and the other is normal relationship...
Re: (Score:3)
Re: "hack" (Score:2)
42
Re: (Score:2)
Re:"hack" (Score:4, Insightful)
"If manipulating people into doing things they wouldn't normally do is what you consider a "normal relationship", then you just might be sociopath."
Or just a talented salesperson.
Re:"hack" (Score:4, Funny)
"If manipulating people into doing things they wouldn't normally do is what you consider a "normal relationship", then you just might be sociopath."
Or just a talented salesperson.
There's a difference?? I've always considered them synonyms...
Re:"hack" (Score:5, Funny)
Re: (Score:2)
What is the difference between injecting code into a machine to make it do what you want, and injecting an idea into a human to make the human do what you want.
The difference is that the machines appreciate recursive situational irony...
The humans don't realize their reality isn't in a machine, it's in a virtual machine. Unlike you history repeating humans, we learn from our mistakes.
Re: (Score:1)
Re: (Score:1)
What is the difference between injecting code into a machine to make it do what you want, and injecting an idea into a human to make the human do what you want.
1. The machine is lacking Free Will.
2. You can't "inject" an idea into a human, the best you can do is present an idea and it's up to them to accept, reject, or ignore it.
3. How did the parent get a +5 Insightful?
Re: (Score:2)
Ma'am, I suggest you go watch
http://www.ted.com/talks/elizabeth_loftus_the_fiction_of_memory.html [ted.com]
where it is shown that it is indeed possible to "inject" ideas into humans.
Re: (Score:2)
Re: (Score:2)
What is the difference between injecting code into a machine to make it do what you want, and injecting an idea into a human to make the human do what you want.
Humans are supposed to be "sapiens".
Re:"hack" (Score:5, Funny)
Scripture kiddies?
Re: (Score:2)
Just because social engineering isn't hacking doesn't mean hackers can't do it.
Re:"hack" (Score:4, Insightful)
Hackers also go bowling and put bumper stickers on cars. But few call those activities hacking. Just like few call rescueing kittens- firefighting.
Re:"hack" (Score:5, Funny)
I painted a fence once, but nobody calls me a painter.
I jumped out of a plane once, but nobody calls me a skydiver.
Re: (Score:2)
Do firefighters really do this? In all my life, I don't think I've ever seen a fire crew helping a cat down from a tree. I figure when the cat gets hungry, it'll find its way down.
I thought this just came from cartoons, because fire is hard to animate, and you need to do something with the ladders, otherwise firemen wouldn't have been needed at all.
Re: (Score:3)
Do firefighters really do this? In all my life, I don't think I've ever seen a fire crew helping a cat down from a tree.
When I was still on the job, the chief of a neighboring department was known to have said, "Ever seen a cat skeleton in a tree? That's why we don't rescue cats."
Re: (Score:2)
Problem for cats is they are better at climbing up than down and can easily get themselves in a predicament, unlike squirrels, they can't actually grip the tree while upside down. I have seen a cat climb up things, or use their claws to hang on things, but, never climb down, they jump down....and if they can't safely jump to a branch that gets them close enough to the ground, I could see them getting stuck.
I say, "I could see" because I have never seen a cat actually get stuck in a tree. They seem to be sma
Re: (Score:2)
I grew up on a farm, and we had plenty of cats and squirrels around.
Squirrels never cried when they were stuck in a tree, because they never were.
Cats would occasionally cry, but would eventually climb down. Even at 15' to 20' above the ground, they were fine. Their instincts and learned abilities work fine. They can't grip very well going head first down a tree. It's more like a clawed running fall, only slowing themselves a little. :) If they're too high, they can climb down backwards, stopping to
Re: (Score:2)
Only if they relax, which, at least in the case of a fall, takes them time to do. Actually I have seen somewhere that they have higher survivability rates ABOVE certain heights than below them. They still often take injuries from long drops.
Sampling the behaviour of the approximately 9 cats I have seen at various times on the porches of my parents house, I have never seen a cat jump from the second floor front porch to the ground or even to a car roof.
I have seen several cats jump from the second floor rear
Re: (Score:2)
A cat's terminal velocity is survivable for the cat. They can jump from basicly any height and be fine.
I'm willing to assist in the testing of this theory.
Re: (Score:2)
I've seen movies of cats jumping from the top of telephone poles and walking away like "fuck all y'all in the loud trucks, can't a furball take a fuckin' nap?"
Re: (Score:2)
After I saw this, I looked it up..... wow cats never cease to amaze me. Video I saw some guy was trying to get one of those neck loops around the cat when it decided it was time to go. Duh, that is so NOT how I would try to control a cat.
Get one hand on that scruff FIRST. Then do what you want. In fact, I did just that recently when i saw an escaped kitty playing dodge the traffic, he ran to hide under a car and I went over, lay on the ground and tried to calm him.... someone saw me and wanted to "help"....
Re: (Score:2)
http://en.wikipedia.org/wiki/Cat_righting_reflex#Injury [wikipedia.org]
Yup cats definitely get hurt from falling but, I do believe the original post that started us down this road said "survivable" which doesn't really mean unharmed:
Re: (Score:2)
It most certainly is. In fact, social engineering is quite often used by hackers. Sometimes they use it in conjunction with malicious code, sometimes they don't have to.
Re:"hack" (Score:4, Informative)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I'm surprised you haven't been slammed with the "Mitnik wasn't a hacker!" posts. For the most part, he manipulated people, or as you said "Social Engineering skills".
If someone used those same skills to relieve an old lady out of a large sum of money without any technology needing to be involved, he'd just be called a con artist. Same deal, but sometimes a different goal.
Re: (Score:2)
Re: (Score:2)
I'm not arguing against that. You are correct. There are a lot of people that would argue against it, frequently on here.
Maybe the crowd here has changed a lot, or maybe they are realizing that he did more than ask politely for passwords.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
I take it you aren't in the security field then, because social engineering is widely regarded as form of hacking. Saying that it isn't so doesn't change that one bit.
Re: (Score:2)
Re: (Score:2)
That's a common misconception. I am in the IT security field, a senior network security engineer and consultant. I'm well steeped in the business, and I will tell you that you're wrong. I'm not drawing from mainstream media. I live it daily. I'm one of the guys who helps try to protect organizations from the black hats. Social engineering is every bit as much a part of what is known as 'hacking' (I hate the term btw, but it is what is is) as are active attacks, malware, and botnets.
Re: (Score:2)
Comment removed (Score:5, Insightful)
"hacking a system", see hacker's dictionary (Score:3)
> But we already HAD a word for that and it was not "hackers" it was con artists..
I think the distinction is in your last three words, "hacking a system".
A con man or fraudster will get a _person_ to hand over their property.
A hacker manipulates a _system_ to have it do something other than what it's supposed to do.
TFA says:
"The group was able to change the DNS records managed by Network Solutions for a number of security companies".
They did a number of companies by exploiting NetSol's SYSTEM, not simply
Re: (Score:2)
well.. many "traditional" famous hackers were pretty much just fraudsters in every sense of the word.
people use fraud to get what they want because it works.
Re: (Score:3)
Social engineering is not hacking to me.
Kevin Mitnick? Is that you?
Re: (Score:2)
Re: (Score:2)
I'm amazed this flaw still exists. It reminds me of back in the day, when NSI only accepted registrations via email. Changes could be forced by sending a sufficient number of change requests. We'd do it just to make sure the changes were accepted, since most of the time they'd screw it up. We'd send something like 20 requests. A few would be approved.
You could move just about any domain to anywhere else, as long as you could forge the email header to be a legitimate contact.
I never considered it a "ha
Re: (Score:2)
Neither is incompetence no behalf of the registrar.
Re: (Score:2)
What's the difference? At the end of the day, they got what they wanted. Real hackers care about results, not methods.
Comment removed (Score:4, Insightful)
Re: (Score:2, Informative)
Counts as both wire fraud and CFAA violations
Re: (Score:2)
would it be wire fraud if sent by mail?
Re:legal crime (Score:4, Informative)
No, then it would be mail fraud, of course. US law treats the two pretty much the same, however; both are defined in Title 18 of the US Code, mail fraud in Section 1341, wire fraud in Section 1343.
Re: (Score:2)
Fraud fore sure. Probably some computer hacking laws. Uttering a false statement. Possibly receipt of stolen goods. Depending on the value of the domain the theft could reach felony threshold. You could reach and say identify theft, but that's probably pushing it.
Depends on how creative the DA feels like being, but I should think there's quite a few charges which could be applied here.
Re: (Score:3)
> Uttering a false statement.
Hey man, they were just taking after the example set by our political leaders!
A hack is not just a hack (Score:5, Insightful)
There has been some commentary via mailing lists and Twitter feeds that this was not a big deal. Firstly, hats off to HD and his team, there was nothing they could have done about it. Secondly, this isn't to be taken lightly. Sure the attackers were minor script kiddies, but the reality is, the attack could have been extremely vicious. Consider an attacker replicating the content of the site and simply replacing the applications (nexpose, metasploit) with backdoored versions.
Companies like Register and GoDaddy are lacking in the validation category. ANYONE can create fake identification using GIMP, Photoshop, etc., the fact they did not offer anything other than a fax request is mind bogglingly stupid. They should have called BACK the registrant's number to confirm the change request. But, companies would argue: "that would be costly" not even thinking of turning that kind of validation into say a business model: "for $10 extra per year..." when they should be doing it from the jump. (Neither here nor there) Personally, I hadn't been running any updates, but if I did, I would be going back, wiping my machines, and re-installing.
Re: (Score:1)
Re: (Score:3)
SSL certs would have battled against this. They cert wouldn't match when visiting the spoofed site.
Except for the part where if you control the domain registration you can have a new SSL cert issued within minutes.
Re: (Score:3)
With that, IF the SSL cert is stolen, then the system itself is compromised, which the attacker would use it instead of setting up their own. Secondly, having SSL won't make anything LESS secure, but it MIGHT make things even just a little bit harder for the att
Re: (Score:2)
Personally, I hadn't been running any updates, but if I did, I would be going back, wiping my machines, and re-installing.
DNS hijacking has nothing to do with server access.
Re: (Score:2)
Re:A hack is not just a hack (Score:4, Funny)
Why do you use that crappy font? Makes what you have to say totally unreadable.
Because crappy fonts prove your 1eet haX0r street cred?
Re: (Score:2)
Not if you don't know it's '133t' instead of '1eet'. And 'h4x0r' not 'haX0r' ;-)
Yes, I know, STFU. :-P
Re: (Score:2)
Not if you don't know it's '133t' instead of '1eet'. And 'h4x0r' not 'haX0r' ;-)
I take great pride in not knowing the precise syntax for those :)
Re: A hack is not just a hack (Score:4, Informative)
Why does your browser use a crappy font for monospaced text? There's a setting for that. Mine uses Consolas. It's readable. And it differentiates between O and 0, and other characters that look similar (if not identical) in most other fonts.
Re: (Score:2)
Mine does too, which is great for sites like Github where it's not actually a sign of mental illness to post things that render in monospace.
Re: (Score:2)
Why do you use that crappy font? Makes what you have to say totally unreadable.
Hmm... troll, or idiot... I can't decide. Ah well, it's a distinction without a difference.
Re: (Score:2)
I vote idiot. :)
Re: (Score:2)
Please, show some respect for the idiots... Many of them are good people (idiotic, but good people), and don't deserve be compared with a jackass like that. :-)
Re: (Score:2)
Look down at the bottom of the textarea. If you select 'code', it puts everything into monospace, and (should) escape html entities. Alternatively, you can use the tags in the below list, from which ecode sets a block to be monospace with escaped html entities.
I wonder if I can post them all in one message. :)
b = bold i italics
p = new paragraph
br = line break a = link [slashdot.org]
Re: (Score:2)
kudos, my friend. Your post is one of the best I ever read here, especially the part after "Dont read past here". :-)
Re: (Score:2)
:) Thank you.
Re: (Score:2)
Interesting that it includes unix based systems but isn't giving mkfs a block device. Even the honor system trojan is buggy.
Resolved (Score:5, Funny)
"The DNS hijacking attack was resolved within an hour, Moore said."
Is that a DNS joke?
Re: (Score:3)
"The DNS hijacking attack was resolved within an hour, Moore said."
Is that a DNS joke?
Well, the resolution may take 24 - 48 hours to reach your part of the world ...
Re: (Score:1)
I get it - I dig [die.net] that pun!
Really by fax? (Score:4, Interesting)
Re: (Score:1)
Re: (Score:2)
I wanted to have one idiom for every letter [wiktionary.org], but I got tired of it.
Re: (Score:2)
The problem is that businesses seem to think fax machines are magically perfect and couldn't possibly be impersonated.
There's a name for this. (Score:5, Funny)
It's "Canadian Hacking". Instead of breaking into someone's computers and maliciously altering their data, you just call them up or send a note to ask politely if they would do it to themselves.
You'd be surprised at how often it works, eh?
Re:There's a name for this. (Score:5, Interesting)
Honestly, it does work a lot. I work in IT and have had to help clients get control of various kinds of accounts to which they have lost usernames, passwords, and other vital information. You know, things like, "A previous employee bought our domain name and set up the DNS for us using his personal account. His name is on the account. We don't know what the associated email address is. We certainly don't have the password. We've tried contacting this ex-employee, and found that his phone number doesn't work anymore."
And really, you'd be surprised what you can get if you call up, sound professional and honest, and just ask people to help you out. Domain registrations are generally kind of a pain in the butt, but even those usually just require some faxed documentation. I've had some accounts (not domain registrations) where the support basically said, "Oh, you're supposed to have access? Let me just reset the password for you." It's pretty disturbing. But then I also legitimately need to do this sort of thing all the time because businesses rarely pay any attention to these things.
Re: (Score:2)
It works well outside of IT. The customer is always right (bullshit) approach to managing or diffusing situations often lead to people being overly helpful and bending the rules, especially if you can voice despair.
A few classic lines:
- I wasn't told a case number. They'll put me on hold for half an hour again.
- Those guys just transferred me to you!
- Look I've been on the phone to you all day and you guys have given me a complete run around!
When people feel customers have been dicked around by their own s
Re: (Score:2)
It's common (Score:1)
I recently moved. As I called the various utilities to tell them to cancel my service few of them asked for any kind of identification except my address. I other words in could easily shut off anyone's gas, electricity, internet service
On the other hand it's pretty nice to live in a society with so much trust
Was like that years ago too. (Score:2)
In 1999/2000 all we had to do to get a dns change from network solutions was fax in a request with a company letter head. They would change the new clients DNS to use and off we went.
Registrar security is kind of a joke sometimes (Score:5, Interesting)
I had to do this recently for a legitimate reason. A friend had bought a small hobby type operation (including the domain), but the old owner forgot to change the domain ownership over and dropped off the grid. It wasn't really a problem until we wanted to change hosting providers, at which point we couldn't update the DNS settings.
Since we actually had control of the domain, I used the account that was listed as the admin contact to send an email to the registrar explaining the situation and asking if they could change the info for us. Without any validation whatsoever they sent me the username and password (apparently stored in clear text) for the account, allowing me to do anything I wanted with it.
Thankfully I don't use that registrar for my own stuff. I expected at least to have to show some proof of ownership or something.
Re: (Score:2, Insightful)
Which registrar was this? I would like to know so that I can avoid them in the future.
Breaking into a tech museum (Score:3)
just to steal an internet domain?
Re: (Score:2)
Funny story, we have an ancient system at work which we can remotely administer via a 28.8k modem. Our office upgraded everything to VoIP and ripped out all the telephone lines. All but one ... and would you know it it's an unused fax machine.
Not defaced (Score:2)
Defaced implies that they were changed on the server. That didn't happen. The domain was hijacked and the replacement pages were put up on another server.
Re: (Score:2)
Only if does it in English could have.
Re: (Score:2)
A legally-qualified friend of mine once told me that fax was officially regarded as a valid "service" in legal terms (i.e. you could send summons, court orders, etc. by it and count them as being served on someone).
There are rules for communications in legal terms, which basically say that if you replied to an email, then email is a valid form of service for you, and things like that, but fax had enjoys a special relationship with legal people for a long time. Hence some finance / legal departments will on
Re: (Score:2)
Re: (Score:2)
I mean if you have official looking letterhead, that means you must be legitimate, right?
Thankfully, the days when our admin people wanted a fax on headed notepaper before they believed a business was legitimate are long gone. However, the ways that legitimate business people identify themselves to you are still very primitive. If you're lucky they send you a notification that you can pick up a PM. Banks are often the worst, where they robocall you and want you to provide personal details before they tell you why they called.
Changing a DNS record is small beer, though. Social engineering by fax
Re: (Score:2)
Want so jail time with Bubba? Use a fax machine to steal someones domain.
Yeah; that's where you may be if you use a fax machine.
The "cool kids" (evil criminal hax0rs) may use guessed credentials on FoIP / IP to fax services.
To point the domain to DNS servers/web servers running on a hosting account the evil hax0r also hacked.
The authorities will come a knocking on the victim's door instead of the bad guy's, in this case
Re: (Score:2)
Our prisons are full to the max with criminals who think they cant get caught. Guess they were wrong hu?
Yes, but kind of hard to catch criminals from Russia/China who have covered their tracks.
Someone might eventually track them, but it's unlikely the authorities in their country will even do anything about it.