{"id":1023,"date":"2024-08-07T09:57:02","date_gmt":"2024-08-07T13:57:02","guid":{"rendered":"https:\/\/domainsure.com\/?p=1023"},"modified":"2024-08-08T10:25:55","modified_gmt":"2024-08-08T14:25:55","slug":"sitting-duck-dns-flaw-is-a-red-herring","status":"publish","type":"post","link":"https:\/\/domainsure.com\/news\/sitting-duck-dns-flaw-is-a-red-herring\/","title":{"rendered":"\u201cSitting Duck\u201d DNS flaw is a Red Herring"},"content":{"rendered":"

\"\"<\/h2>\n

Four key points about the “sudden” emergence of this vulnerability
\n– and how to mitigate it.<\/h2>\n

On July 31st, security journalist Brian Krebs published an article<\/a> about a DNS vulnerability dubbed “Sitting Duck”, which claimed:<\/p>\n

“More than a million domain names \u2014 including many registered by Fortune 100 firms and brand protection companies \u2014 are vulnerable to takeover by cybercriminals thanks to authentication weaknesses at a number of large web hosting providers and domain registrars, new research finds.”<\/em><\/p><\/blockquote>\n

The research was a report via Infoblox<\/a> titled “Who Knew Domain Hijacking Was So Easy?”<\/strong><\/p>\n

Because this was a DNS story, I was tagged several times on LinkedIn – where a lengthy thread had ensued<\/a> – as well as via email by readers who thought it was decent material for our #AxisOfEasy tech digest<\/a> over on the easyDNS side of the shop.<\/p>\n

Before long it was posted to Hackernews replete with a long comment thread<\/a> that was rife with Gel-Mann Amnesia Effect.<\/p>\n

What exactly is\u00a0<\/em>the “Sitting Duck” vulnerability?<\/h2>\n

It’s basically this:<\/p>\n

Somebody registers a domain name, heads over to some third party service that ends up hosting the DNS and sets up their zone on their nameservers.<\/p>\n

\"\"<\/p>\n

That could be a web host, a third-party DNS hosting provider, a CDN – anybody who is\u00a0not\u00a0<\/em>the registrar for the domain.<\/p>\n

Time passes.<\/p>\n

Things change.<\/p>\n

Eventually, events don’t work out as planned – the project fizzles, the team is dissolved, the product gets discontinued or the marketing effort ends. The account on that third-party provider gets shut down – either by the client, or by the vendor on service expiry – it doesn’t matter.<\/p>\n

The domain, however, remains<\/em> delegated to that provider’s nameservers –\u00a0and that’s\u00a0<\/em>the “Sitting Duck”.<\/p>\n

It means that anybody who figures out that there’s this otherwise live domain (“live” in the sense that it’s registration is still current, and may even be pre-paid for years into the future), is just sitting there, pointing at those nameservers and there’s no zone on those nameservers to answer any residual queries that may come in.<\/p>\n

You can even see via services like Ahrefs<\/strong> or Semrush<\/strong> which domains have pre-existing backlinks, and can get a sense for which ones would still have residual traffic.<\/p>\n

So\u00a0if\u00a0<\/em>that provider allows somebody, anybody, to walk in the front door, create an account, and add that very same domain to their new account – they can now create a zone for it using the providers DNS management panel and make it do whatever they want:<\/p>\n