Incidents

Increasing cases of DNS poisoning being spotted

Over the last weeks we’ve seen an increase in cases where DNS poisoning has been used to make money. DNS poisoning is when attackers ‘poison’ a DNS server so that it gives a different address to a certain DNS entry.

For example this will mean that with a poisoned DNS server a query to www.microsoft.com will lead to a malicious site which wants to install malware. This of course can also be done in the case of banking websites.

There have been some products vulnerable to DNS poisoning and from what I see on the web I’m inclined to believe attackers are actively looking for more vulnerable products.

The scary thing about DNS poisoning is that no matter how clean your own PC is, you can never be sure if the site you are visiting is the one you intended to visit.

Increasing cases of DNS poisoning being spotted

Your email address will not be published. Required fields are marked *

 

Reports

BlindEagle flying high in Latin America

Kaspersky shares insights into the activity and TTPs of the BlindEagle APT, which targets organizations and individuals in Colombia, Ecuador, Chile, Panama and other Latin American countries.

APT trends report Q2 2024

The report features the most significant developments relating to APT groups in Q2 2024, including the new backdoor in Linux utility XZ, a new RAT called SalmonQT, and hacktivist activity.

Subscribe to our weekly e-mails

The hottest research right in your inbox