How Can Disrupting DNS Communications Thwart a Malware Attack?

0
388
How Can Disrupting DNS Communications Thwart a Malware Attack?



Question: How does a risk actor make the most of DNS communications in malware assaults?

Dave Mitchell, CTO, Hyas: The thought you could defend your self from all malware is unrealistic, particularly contemplating malware is an umbrella time period that doesn’t consult with any particular exploit, vector, purpose, or methodology. Because the vary of cyber threats is so broad and various, there isn’t a magic bullet that may repel each assault. So it is actually solely a matter of time earlier than your community surroundings is compromised, forcing you to make some very exhausting selections.

For occasion, within the medical subject, profitable cyber assaults do not simply have an effect on a corporation’s capacity to operate; in addition they have main authorized and reputational repercussions. Because of those circumstances, medical business victims find yourself paying out ransomware calls for at the next price than every other business. If they have been in a position to detect indicators of issues earlier than they change into full-blown assaults, healthcare organizations might save a mean of $10.1 million per incident averted.

Most safety options handle a selected subsection of malware and/or infiltration vectors, however none of them can cease all threats on the gate. Even if they might, generally the gate is bypassed altogether. As we noticed with the Log4J exploit and the current compromise of the favored Ctx Python bundle, “trusted” useful resource libraries hosted on locations like GitHub could be compromised by exterior entities and used to ship payloads of malware to 1000’s of endpoints with out instantly triggering a purple flag.

Not all threats lurk solely in our on-line world. Returning to the healthcare business for instance highlights one other assault vector that may get round your entire perimeter safety — bodily entry. Most hospitals, doctor’s places of work, pharmacies, and different medical amenities depend on networked terminals and units positioned (or accidently left) in locations the place they are often accessed by sufferers, guests, or different unauthorized customers. In conditions like these, it does not matter how well-defended your community is from exterior assaults as a result of the unhealthy actor can merely insert a USB stick or use a logged-in machine to entry malware, compromising the community from inside.

This might seem to be an unwinnable scenario, however fortunately there may be one characteristic that ties the overwhelming majority of malware collectively — a shared Achilles’ heel known as the Domain Name System (DNS). More than 91% of malware makes use of DNS communication in some unspecified time in the future throughout its assault lifecycle, making DNS a useful choke level within the combat towards cyber threats.

When a bit of malware first finds its means onto your community, it tries to keep away from detection. It makes use of this time as a reconnaissance part throughout which it makes an attempt to unfold to extra units within the community surroundings, find essential sources, and compromise backup storage.

It can also be throughout this time that the malware wants to speak again to the hackers’ command and management (C2) infrastructure to obtain directions and report the knowledge it has uncovered in regards to the community. Like any site visitors on the Internet, to speak again out into the world, it must make a request to a website identify server. By using a protecting DNS answer, community directors can monitor DNS site visitors for indicators of malicious exercise after which take motion by blocking, quarantining, or in any other case disrupting it.

Unfortunately, with new threats being developed on a regular basis and the ever-present threat of a bodily initiated assault, firms should put together for the inevitable profitable breach of their community. However, as soon as malware has gotten inside your community, it’s nearly sure to make use of DNS communication in some unspecified time in the future. A protecting DNS answer can detect these irregular requests and block them solely, rendering the malware inert and letting you rapidly start the method of cleansing your techniques and shoring up your defenses for subsequent time.

LEAVE A REPLY

Please enter your comment!
Please enter your name here