[ISN] Hushmail DNS Attack Blamed on Network Solutions

InfoSec News isn at c4i.org
Mon May 2 02:29:11 EDT 2005


http://www.eweek.com/article2/0,1759,1791152,00.asp

By Ryan Naraine 
April 29, 2005 

Secure e-mail service provider Hushmail Communications plans to pursue 
a criminal investigation into a hacking attack that redirected users 
to a defaced Web site. The company pinned the blame for the breach 
squarely on the shoulders of domain name registrar Network Solutions.

Hushmail, which markets PGP-encrypted e-mail, file storage and vanity 
domain services, has opened a criminal investigation with the Royal 
Canadian Mounted Police in Vancouver to get to the bottom of a DNS 
server breach caused by a combination of social engineering, phishing 
and pharming tactics.

Brian Smith, chief technical officer at Hushmail Communications Corp., 
said in an interview with Ziff Davis Internet News that the attacker 
or attackers simply called the Network Solutions Inc. support center 
and gained access to enough customer account information to alter the 
Hushmail DNS (Domain Name System) settings.

"They used a name not associated with Hush Communications and was able 
to get information from Network Solutions," Smith said. Using the 
information collected from Network Solutions' customer service, Smith 
said the DNS information was changed to redirect users visiting the 
"hushmail.com" URL to a defaced Web site.

For a brief period, Hushmail's domain was either unavailable or 
appeared defaced with an image of Hushmail's logo with the following 
text: "The Secret Service is watching. - Agent Leth and Clown Jeet 3k 
Inc." Zone-H.org has archived a screenshot [1] of the defacement.

Smith said Network Solutions promised to investigate and issue a 
statement on the breach, but at press time Friday, Hushmail had yet to 
receive official communication from the Herndon, Va.-based registrar.

Network Solutions spokeswoman Susan Wade confirmed that the breach 
occurred as a result of certain weaknesses in the registrar's 
customer-service security measures but declined to provide specifics, 
citing customer privacy issues. 

"We're seriously investigating the incident. We are aware that a 
hacker temporarily altered this customer's [DNS records]. Our security 
team promptly rectified the situation," Wade told Ziff Davis Internet 
News.

She described the breach as an "isolated incident" and said Network 
Solutions would immediately institute "additional security measures to 
ensure it doesn't occur in the future."

"We've brought everyone in and gone over the procedures, and we've 
implemented some additional ones. I can't go into details for obvious 
reasons, but we are taking this very, very seriously," Wade added.

In addition to supporting RCMP's investigation in Vancouver, Wade said 
a separate criminal investigation is being launched in the United 
States. 

At Hushmail's end, Smith said the episode has been frustrating. "We're 
still waiting for a statement from Network Solutions. We were told by 
an employee that the attacker was given the DNS information over the 
telephone, but they've not sent anything official to us. I don't want 
to comment on what may or may not have happened at their end," Smith 
said.

For now, Hushmail is working to erase the negative perception of an 
e-mail security provider with a major server breach. "Initially, it 
was embarrassing but we're pleased that the users and the media have 
been very sympathetic to what happened here. To nontechnical users, it 
will take some explaining, but it's quite clear that this could have 
happened to anyone."

"The Internet as a whole is a notoriously nonsecure infrastructure. 
We're operating within that. This is a big worry for the entire 
Internet. That's why phishing, pharming and social engineering attacks 
have become a big issue," Smith said.

Hushmail has been upfront about the hacking attack, publishing a daily
log [2] with updates for users.

"To the best of our knowledge, the DNS issues caused by the caching of
the altered addresses should now have ceased. The correct addresses
should now have propagated across the Internet, and all users should
be able to access Hushmail," the latest entry says.

The company said there was no unauthorized access to any of the Hush
servers. "Data managed by Hush was not compromised. During this
period, e-mail sent to hushmail.com will not have been delivered,"  
Hushmail said.

Rick Fleming, chief technology officer at Texas-based security outfit
Digital Defense Inc., said the Hushmail nightmare points to a "major
weakness" in the way domain name registrars authenticate requests for
DNS changes.

"We'll continue to see these types of social engineering attacks
because it's becoming easier to impersonate someone and collect
information. There is definitely a weakness in the way the domain name
registrars handle authentication. If they don't have a way to
adequately identify who the domain owners are, these attacks will
continue to happen," Fleming said.

"What's to stop this from affecting a Yahoo or a Google? Nothing. The
underlying flaw is the domain name systems work. It's an implied
trusted relationship without any authentication or verification and
that needs to be fixed," Fleming said.

[1] http://www.zone-h.org/defacements/mirror/id=2309823/
[2] http://www.hushmail.com/login-status





More information about the ISN mailing list