Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/16/2020
03:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

83% of Forbes 2000 Companies' Web Domains Are Poorly Protected

Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.

Web domains belonging to a large proportion of Forbes Global 2000 companies are troublingly vulnerable to domain hijacking, DNS attacks, and other common forms of abuse.

A new study by domain protection provider CSC's Brand Services Division reveals that 83% of these organizations have not adopted basic security protections against unauthorized changes to their WHOIS information, DNS modifications, and other transfer-away risks.

Seventy-three percent, for instance, do not use registry-lock services that prevent unauthorized changes to DNS information that could lead to a website becoming unavailable or visitors being redirected to malicious websites. Only 39% use the DMARC email authentication protocol that protects against an organization's email domain being used for email spoofing. A mere 3% use DNS security extensions (DNSSEC) that protect against DNS hijacking attacks.

"The main takeaway from this report is that the largest companies in the world remain very vulnerable to domain name and DNS hijacking, domain shadowing, and subdomain hijacking attacks," says Mark Calandra, executive vice president at CSC Digital Brand Services.

Especially troubling is the low adoption of domain security measures by banks, he says. CSC's study finds banks ranking lowest in terms of using registry-lock services and corporate domain-registrar services, even though they are often the most highly targeted organizations.

"One rationale may be because close to half of the banks represented in the Global 2000 are from Asia, and Asia is the region where there is generally lower domain security measures in place," Calandra says.

CSC's study comes amid signs that bad actors are ramping up attacks against vulnerable and weakly protected domains and DNS services. Earlier this year, the nonprofit Spamhaus Project, which tracks email spam-related activity worldwide, reported observing a recent increase in domain-name hijacking by criminals engaged in business email compromise campaigns. According to Spamhaus, criminals are increasingly using phishing, social engineering, and vulnerability exploits to gain access to legitimate domains.

Once they have gained access, the criminals "create new hostnames (domain shadowing) that point to a different IP range that is not associated with the root domain," Spamhaus said in a report. "Alternatively, they will change the name servers of the domain to point to a new location."

After changing the DNS, attackers have then been leveraging the victim's brand image and reputation to distribute spam widely or to host malware and disrupt businesses and users in other ways. The positive reputation associated with the stolen domains often is enough for the attackers to evade anti-spam measures, Spamhaus said.

Retail-Grade Domain Registrars
According to CSC's study, many domain-security issues prevalent among the Forbes Global 2000 community might have at least something to do with their use of generic retail domain-name registrars and service providers. In fact, more than half — 53% — use retail domain registrars that often do not offer enterprise-grade security protections. A majority of the organizations in the CSC study do not have any DNS hosting redundancy, meaning they are vulnerable to service disruptions in case of a distributed denial-of-service attack.

Calandra says common shortcomings among retail registrars include inadequately trained staff and relatively immature technical and operational processes to safeguard large enterprise domains against sophisticated phishing, social-engineering attacks that lead to DNS and domain-name hijacking, domain shadowing, and subdomain hijacking.

"These shortcomings have created a sort of haven for bad actors to take advantage," he says.

Proper management of DNS means securing access to domain and DNS management systems, including via two-factor authentication, IP validation, and federated ID mechanisms, he says. Organizations also need to have a handle on user roles and permissions within their domain and DNS management systems, especially those with elevated access controls. Adoption of security features such as DNSSEC, CAA records, registry lock, and DMARC can also help bolster DNS security, Calandra says.

CSC's study shows adoption of domain-name security measures tend to vary quite widely by industry. Generally, organizations in the IT and media and entertainment sectors have higher adoption of domain-name security controls, such as registry locks and DMARC. The same industries also rank relatively high in their use of enterprise-grade domain registrars compared with other sectors. At the opposite end of the spectrum are banks, real-estate firms, and organizations in the materials sector.

Domain names and the underlying DNS power mission-critical web infrastructure, such as email, apps, and websites, Calandra says. "They are noted soft targets," he says, "providing an easier way to breach your network, intercept email, and redirect websites for financial gain."

Related Content:

 

 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20491
PUBLISHED: 2021-04-16
IBM Spectrum Protect Server 7.1 and 8.1 is subject to a stack-based buffer overflow caused by improper bounds checking during the parsing of commands. By issuing such a command with an improper parameter, an authorized administrator could overflow a buffer and cause the server to crash. IBM X-Force ...
CVE-2021-22539
PUBLISHED: 2021-04-16
An attacker can place a crafted JSON config file into the project folder pointing to a custom executable. VScode-bazel allows the workspace path to lint *.bzl files to be set via this config file. As such the attacker is able to execute any executable on the system through vscode-bazel. We recommend...
CVE-2021-31414
PUBLISHED: 2021-04-16
The unofficial vscode-rpm-spec extension before 0.3.2 for Visual Studio Code allows remote code execution via a crafted workspace configuration.
CVE-2021-26073
PUBLISHED: 2021-04-16
Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or ...
CVE-2021-26074
PUBLISHED: 2021-04-16
Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a se...