Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Mastercard DNS Error Went Unnoticed for Years (krebsonsecurity.com) 25

A security researcher discovered and fixed a critical domain name server misconfiguration in Mastercard's systems that persisted undetected for nearly five years, potentially exposing the credit card giant to traffic interception risks.

Philippe Caturegli, founder of security firm Seralys, found that one of Mastercard's five DNS servers incorrectly pointed to "akam.ne" instead of "akam.net" from June 2020 to January 2025. He spent $300 to register the domain through Niger's domain authority to prevent potential exploitation. Mastercard said the typo has been corrected, insisting there was "not a risk to our systems."

Mastercard DNS Error Went Unnoticed for Years

Comments Filter:
  • Not Suprising (Score:5, Insightful)

    by mkosmo ( 768069 ) <mkosmo@@@gmail...com> on Wednesday January 22, 2025 @03:51PM (#65110535) Homepage
    I'm not surprised that a company of that size had such an issue lurking -- but how many eyes have probably looked at that DNS record over the years and looked right past that typo? Something should have eventually seen it, even if it was just DNS propagation monitoring. But the claim that it created no risk? Absolute hogwash. Without trying, a threat actor could have gotten a fifth of the traffic headed to destinations that used that same NS record content... which looks like it included their own API gateways!
    • by mysidia ( 191772 )

      a threat actor could have gotten a fifth of the traffic headed to destinations that used that same NS record content... which looks like it included their own API gateways!

      Yes. But there should still be DNSSEC signing to prevent an accidentally listed DNS server for publishing anything right?

      Furthermore you would need a valid TLS certificate in order spoof an API gateway in order to intercept data. So I guess they could say the risk is none since the ability to intercept and reply to authoritative D

  • But... (Score:5, Funny)

    by Shaitan ( 22585 ) on Wednesday January 22, 2025 @03:51PM (#65110537)

    "He spent $300 to register the domain through Niger's domain authority to prevent potential exploitation"

    Did he put it on his mastercard?

    • by KlomDark ( 6370 )
      Please
    • by Shaitan ( 22585 )

      He should have put the charge on a clean mastercard account and then refused to pay the bill, when they complained he should have pointed them to a policy document hosted on "their domain" that said he doesn't have to pay.

  • by ls671 ( 1122017 ) on Wednesday January 22, 2025 @03:59PM (#65110561) Homepage

    From TFS:

    not a risk to our systems

    Of course not, it's a risk to whoever tries to use their systems although. And it could even be a risk to their systems if their systems try to connect to other of their systems...

    • by Shaitan ( 22585 )

      It's also a reputational risk to their organization... which would normally be a bigger potential cost than a systems compromise; even for mastercard.

      • by mkosmo ( 768069 ) <mkosmo@@@gmail...com> on Wednesday January 22, 2025 @04:32PM (#65110665) Homepage
        Yeah, but have you ever tried to articulate reputational risk to leaders? They either don't comprehend it -- or even if you quantify it, they don't believe the outputs.
        • by DarkOx ( 621550 ) on Wednesday January 22, 2025 @05:02PM (#65110775) Journal

          They do comprehend it. They know it is mostly a myth perpetuated by the infosec industry to justify the spending of a lot of money on their products and services.

          Let's face it, anyone refusing to shop at TJ Max, Target, Home Depot, how many people moved of o365 because of various Microsoft Cloud security failures?

          Even in the Security industry where it really ought to matter it does not seem to. Citrix Netscalers are as popular as ever, people buy Cisco products after so so many embarrassing security failures, PaloAlto has had their RCEs still everyones favorite layer-7 device.

          Hell how much business has Crowd Strike even lost of the availability crisis of their own making?

          Even Solar Winds I am not sure the fact that it isn't as popular as it once was has anything to do with reputation, more so just generalized competition from cloud and other dev-ops platforms.

          • by mkosmo ( 768069 )
            Reputational risk isn't the same everywhere. It's a much bigger deal for B2B, for example. But people absolutely care - Take a look at the flood of people that left LastPass after their large breach. It's harder for people to walk away from the big banks or retailers, so their impact is significantly reduced. But in any case, it's not just a myth. It just has to be taken in context.
  • by Anonymous Coward

    How did this configuration go unnoticed? Were resolution failures not logged or were logs not reviewed? Either answer is a violation of PCI DSS requirements.

    • by Anonymous Coward

      Please. PCI DSS certification is for punishing mom-and-pop businesses with IT consultant fees, not for holding the overlords accountable for their cheap Sec spending.

    • by ls671 ( 1122017 )

      This wouldn't have caused any resolution failure on their side. "akam.ne" is returned instead of "akam.net" and whoever tries to connect to akam.ne then get the failure unless somebody sets a server to listen for that traffic. Also, they say it was only 1 out of 5 DNS and DNS lookups will transparently try another server in one doesn't answer.

      • And we know what akam.net was used for, most likely Akamai edge cache content. Wonder why any dev did not notice they were not retrieving the expected content? How many timeouts, even a 408?

        This should have been obvious at some point, and resolved. Ugly, marginally competent dev teams. A bad look. Expect a few months of deep dive auditing to find the other problems yet to be found.

        Oh, and I know, a failover somewhere masked this. Is that better?

        • by ls671 ( 1122017 )

          Plenty we don't know so many possibilities. Example: the faulty DNS was never hit by the dev team and was only returned to serve queries from some other countries, etc. etc. etc.

          • 'never hit by the dev team'

            Gotcha, the test team is not part of the dev team. We ultimately blame the test team, right?

    • by mysidia ( 191772 )

      PCI DSS wouldn't require a DNS resolution error to be logged.

      Also it is not possible for the domain nameserver operator to log what would happen.

      Since it's only 1 nameserver; you don't get a resolution error - most DNS clients will send a parallel query to multiple nameservers, and whichever nameserver you get the first answer from wins. In this case the incorrect nameserver never returns an answer (SERVFAIL condition), so peoples' DNS clients just ignore it - no resolution failure occurs.

  • ... got the T-shirt.

  • Priceless (Score:5, Funny)

    by Roger W Moore ( 538166 ) on Wednesday January 22, 2025 @04:13PM (#65110599) Journal
    Cost of registering a domain name in Niger: $300. Cost of having your credit card company's traffic intercepted: billions. Cost of having a security researcher willing to buy a domain to save your company massive financial and reputational loss when you are incompetent: priceless.
  • by Squiff ( 1658137 ) on Wednesday January 22, 2025 @04:29PM (#65110655)
    ...For everything else, there's Mastercard

"Regardless of the legal speed limit, your Buick must be operated at speeds faster than 85 MPH (140kph)." -- 1987 Buick Grand National owners manual.

Working...