[ISN] Hushmail DNS Attack Blamed on Network Solutions
InfoSec News
isn at c4i.org
Mon May 2 02:29:11 EDT 2005
http://www.eweek.com/article2/0,1759,1791152,00.asp
By Ryan Naraine
April 29, 2005
Secure e-mail service provider Hushmail Communications plans to pursue
a criminal investigation into a hacking attack that redirected users
to a defaced Web site. The company pinned the blame for the breach
squarely on the shoulders of domain name registrar Network Solutions.
Hushmail, which markets PGP-encrypted e-mail, file storage and vanity
domain services, has opened a criminal investigation with the Royal
Canadian Mounted Police in Vancouver to get to the bottom of a DNS
server breach caused by a combination of social engineering, phishing
and pharming tactics.
Brian Smith, chief technical officer at Hushmail Communications Corp.,
said in an interview with Ziff Davis Internet News that the attacker
or attackers simply called the Network Solutions Inc. support center
and gained access to enough customer account information to alter the
Hushmail DNS (Domain Name System) settings.
"They used a name not associated with Hush Communications and was able
to get information from Network Solutions," Smith said. Using the
information collected from Network Solutions' customer service, Smith
said the DNS information was changed to redirect users visiting the
"hushmail.com" URL to a defaced Web site.
For a brief period, Hushmail's domain was either unavailable or
appeared defaced with an image of Hushmail's logo with the following
text: "The Secret Service is watching. - Agent Leth and Clown Jeet 3k
Inc." Zone-H.org has archived a screenshot [1] of the defacement.
Smith said Network Solutions promised to investigate and issue a
statement on the breach, but at press time Friday, Hushmail had yet to
receive official communication from the Herndon, Va.-based registrar.
Network Solutions spokeswoman Susan Wade confirmed that the breach
occurred as a result of certain weaknesses in the registrar's
customer-service security measures but declined to provide specifics,
citing customer privacy issues.
"We're seriously investigating the incident. We are aware that a
hacker temporarily altered this customer's [DNS records]. Our security
team promptly rectified the situation," Wade told Ziff Davis Internet
News.
She described the breach as an "isolated incident" and said Network
Solutions would immediately institute "additional security measures to
ensure it doesn't occur in the future."
"We've brought everyone in and gone over the procedures, and we've
implemented some additional ones. I can't go into details for obvious
reasons, but we are taking this very, very seriously," Wade added.
In addition to supporting RCMP's investigation in Vancouver, Wade said
a separate criminal investigation is being launched in the United
States.
At Hushmail's end, Smith said the episode has been frustrating. "We're
still waiting for a statement from Network Solutions. We were told by
an employee that the attacker was given the DNS information over the
telephone, but they've not sent anything official to us. I don't want
to comment on what may or may not have happened at their end," Smith
said.
For now, Hushmail is working to erase the negative perception of an
e-mail security provider with a major server breach. "Initially, it
was embarrassing but we're pleased that the users and the media have
been very sympathetic to what happened here. To nontechnical users, it
will take some explaining, but it's quite clear that this could have
happened to anyone."
"The Internet as a whole is a notoriously nonsecure infrastructure.
We're operating within that. This is a big worry for the entire
Internet. That's why phishing, pharming and social engineering attacks
have become a big issue," Smith said.
Hushmail has been upfront about the hacking attack, publishing a daily
log [2] with updates for users.
"To the best of our knowledge, the DNS issues caused by the caching of
the altered addresses should now have ceased. The correct addresses
should now have propagated across the Internet, and all users should
be able to access Hushmail," the latest entry says.
The company said there was no unauthorized access to any of the Hush
servers. "Data managed by Hush was not compromised. During this
period, e-mail sent to hushmail.com will not have been delivered,"
Hushmail said.
Rick Fleming, chief technology officer at Texas-based security outfit
Digital Defense Inc., said the Hushmail nightmare points to a "major
weakness" in the way domain name registrars authenticate requests for
DNS changes.
"We'll continue to see these types of social engineering attacks
because it's becoming easier to impersonate someone and collect
information. There is definitely a weakness in the way the domain name
registrars handle authentication. If they don't have a way to
adequately identify who the domain owners are, these attacks will
continue to happen," Fleming said.
"What's to stop this from affecting a Yahoo or a Google? Nothing. The
underlying flaw is the domain name systems work. It's an implied
trusted relationship without any authentication or verification and
that needs to be fixed," Fleming said.
[1] http://www.zone-h.org/defacements/mirror/id=2309823/
[2] http://www.hushmail.com/login-status
More information about the ISN
mailing list