• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Bad Sites   »   Rogue Domain Name System Servers [reposted]

Rogue Domain Name System Servers [reposted]

  • Posted on:August 17, 2007 at 9:58 am
  • Posted in:Bad Sites
  • Author:
    Trend Micro
0

Note that this entry was first posted last March 27, 2007.

We’ve received a very interesting write-up from our associates, Feike Hacquebord and Chenghuai Lu, regarding rogue DNS servers. I’m sure you’ll find the report below quite informative.

Rogue DNS Servers

Researchers of Trend Micro have identified a network of more than 115 rogue DNS servers, which are used by DNS-changing Trojans. This article describes threats imposed by these rogue DNS servers.

DNS

Domain Name System servers resolve human readable domain names to IP addresses that are assigned to computer servers on the Internet. Normally, when an Internet user types a web address in the address bar of his Internet browser, www.google.com for example, a DNS server resolves that domain name to an IP address that is hosting the Google webpage. In this way, his computer knows where to fetch www.google.com. If a user mistypes the domain, e.g. wwe.google.com, the DNS server fails to resolve the domain and the user gets an error message.

Most Internet users automatically use the DNS servers of their ISP. DNS-changing Trojans silently modify computer settings to use foreign DNS servers. These DNS servers are set up by malicious third parties and translate certain domains to fallacious IP addresses. As a result, victims are redirected to possibly malicious websites without them noticing it. For example, if a user wants to view www.google.com, a rogue DNS server may resolve www.google.com to an IP address controlled by an unknown third party. If that third party creates pages that look exactly like those of Google, the user might think that he is browsing Google indeed, without noticing that he is actually visiting a website controlled by somebody else than Google. This may cause the user to leak sensitive information to third parties.

Network of 115+ rogue DNS servers

Researchers of Trend Micro have identified a network of more than 115 rogue DNS servers that are used by a certain variant of TROJ_DNSCHANG [1]. These DNS servers exhibit interesting behavior. We found that the DNS servers resolve most existing domains correctly at the times we queried them. However, for non-existing domain names, the rogue DNS servers do not return the usual error message but they instead resolve the domain name to a malicious IP address.

See Figure 1 for an example.

(1) The DNS query result on wwe.google.com from legitimate DNS server

(2) The DNS query result on wwe.google.com from a rogue DNS server

Figure 1. DNS queries on wwe.google.com

We entered “wwe.google.com” in the address bar of an Internet browser that is using one of the rogue DNS servers to resolve domain names. We found that instead of displaying the usual error message “page not found”, it redirected us to a website that hosts a rogue adult search engine. See Figure 2.

Figure 2. Result of visiting a non-existent webpage before and after Trojan infection

Another interesting thing we found is that the rogue DNS servers hijack some known bad domain names that hosted malware or C&C servers. For example, www.toolbarpartner.com is an old infamous bad domain of such kind, which is currently parked. The rogue DNS servers resolve www.toolbarpartner.com to different IP addresses than the authoritative nameservers do. See Figure 3.

Figure 3. DNS queries on www.toolbarpartner.com from infected hosts

Resolving bad domain names differently has the result that other malware, which might be present on the victim�¢??s computer, may work in another way than they were originally designed. In particular, a built-in update function that polls a website for updates of malware may now generate automated clicks on adult webpages (clickfraud) . In our example, attempts to fetch malware updates from www.toolbarpartner.com on a computer infected with the DNS-changing Trojan we are discussing in this article, result in clicks on adult webpages indeed.

Apparently, the rogue DNS servers are used for click-fraud. The fact that there are more than 115 rogue DNS servers that are all identical suggests that there are a lot of victims infected with this particular kind of DNS -changing malware. The infected computers together form a large network that can generate a lot of traffic to any website.

The rogue DNS servers include, but are not limited to these addresses:

References:

TROJ_DNSCHANG.BM

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.