• Home
  • About Us
  • Contact
  • Advertise
  • Awards
  • Privacy Policy
  • Twitter
  • Facebook
  • RSS
TheDomains.com

DNS: Rouge Servers on the Lose

February 13, 2008 by Michael Berkens

According to a report by the  Georgia Institute of Technology and Google Inc

Servers controlled by hackers that reroute Internet traffic from infected computers to fraudulent Web sites are increasingly being used to launch attacks.
The report estimates roughly 68,000 servers on the Internet are returning malicious Domain Name System results, which means people with compromised computers are sometimes being directed to the wrong Web sites — and often have no idea.

The peer-reviewed paper, which offers one of the broadest measurements yet of the number of rogue DNS servers, was presented at the Internet Society’s Network and Distributed System Security Symposium in San Diego.

The fraud works like this: When a user with an affected computer tries to go to, for example, Google’s Web site, they are redirected to a spoof site loaded with malicious code or to a wall of ads whose profits flow back to the hackers.

The hackers who hijack DNS queries are looking to steal personal information, from e-mail login credentials to credit data, and take over infected machines.

The spoof sites run the gamut. Some are stunningly convincing, others amusingly bogus with spelling errors and typos.

The DNS system is a critical part of the Internet’s infrastructure, used to make sure computers know how to contact each other. People usually automatically use the DNS servers of their Internet providers, but the recent wave of attacks modify the settings on victims’ computers to send traffic to rogue DNS servers.

Attacks using manipulated DNS results aren’t new. Profit-driven hackers have a strong incentive to control where users go on the Web. The paper looked at viruses that started appearing in 2003 designed to alter the DNS settings on infected computers.

The report noted the rogue DNS servers don’t always return incorrect results, often fooling users into believing their Internet access is working properly. Hackers thus can route users to malicious Web sites whenever they choose.

Most up-to-date antivirus software will catch and banish the viruses used to change DNS settings. Once a computer’s been infected, users need to run a new scan with the latest software and change their DNS settings back.

Security experts not involved in preparing the paper said it adds valuable data about the scope of an increasingly popular type of attack.

Filed Under: Internet News

About Michael Berkens

Michael Berkens, Esq. is the founder and Editor-in-Chief of TheDomains.com. Michael is also the co-founder of Worldwide Media Inc. which sold around 70K domain to Godaddy.com in December 2015 and now owns around 8K domain names . Michael was also one of the 5 Judges selected for the the Verisign 30th Anniversary .Com contest.

« News Corp. and Yahoo in Talks
Marchex Beat’s Street Estimate »

Comments

  1. Heidi says

    February 14, 2008 at 3:22 pm

    How do you know if your computer is compromised?


Recent Articles

  • Dynadot increasing auction deposits
  • Rick Schwartz AiReviews.com deal sets off a flurry of AiReview related domain registrations
  • Sedo weekly domain name sales led by Diffs.com

Recent Comments

  • Raymond Hackney on Rick Schwartz weighs in on the second Coinbook.com auction
  • James K. on Rick Schwartz weighs in on the second Coinbook.com auction
  • Jose on Rick Schwartz weighs in on the second Coinbook.com auction
  • Rick Schwartz on James Booth is a bit miffed by those shitting on the .ai extension
  • brad on James Booth is a bit miffed by those shitting on the .ai extension

Categories

Archives

Copyright ©2025 TheDomains.com