Navigation
Recherche
|
DHS Issues Security Alert About Recent DNS Hijacking Attacks
mercredi 23 janvier 2019, 03:20 , par Slashdot
The U.S. Department of Homeland Security has published today an 'emergency directive' that contains guidance in regards to a recent report detailing a wave of DNS hijacking incidents perpetrated out of Iran. ZDNet reports: The emergency directive [1, 2] orders government agencies to audit DNS records for unauthorized edits, change passwords, and enable multi-factor authentication for all accounts through which DNS records can be managed. The DHS documents also urges government IT personnel to monitor Certificate Transparency (CT) logs for newly-issued TLS certificates that have been issued for government domains, but which have not been requested by government workers.
The emergency directive comes after last week, the DHS issued an alert about ongoing DNS hijacking attacks through its US-CERT division. The DHS US-CERT alert was based on a report published last week by U.S. cyber-security firm FireEye. The now infamous report detailed a coordinated hacking campaign during which a cyber-espionage group believed to operate out of Iran had manipulated DNS records for the domains of private companies and government agencies. The purpose of these DNS hijacks was to redirect web traffic meant for companies and agencies' internal email servers towards malicious clones, where the Iranian hackers would record login credentials. Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/-jS4DCZ4z6s/dhs-issues-security-alert-about-recent-dns-hija...
|
56 sources (32 en français)
Date Actuelle
ven. 22 nov. - 12:23 CET
|