Usually, your operating system will be assigned a DNS server either via DHCP (or RAs in IPv6) or statically. The resolver library on a typical workstation will then go forward and pass all DNS lookups to this set of DNS servers. However, malware sometimes tries to use its own DNS servers, and blocking outbound port 53 traffic (udp and tcp) can help identify these hosts.
Brent, one of our readers, does just that and keeps finding infected machines that way. Just now, he is investigating a system that attempted to connect to the following name servers:
101.226.4.6
114.114.114.114
114.114.115.115
123.125.81.6
140.207.198.6
202.97.224.69
211.98.2.4
218.30.118.6
14.33.133.189
He has not identified the malware behind this yet, but no other system he is using ("we are running bluecoat web filter AND we're using OpenDNS AND I'm running snort"). Brent uses oak (http://ktools.org/oak/) to help him watch his logs and alert him of issues like this.
According to the Farsight Security passive DNS database, these IPs resolve to a number of "interesting" hostnames. I am just showing a few here (the full list is too long)
ns-facebook-[number]-[number].irl-dns.info <- the [number] part appears to be a random number
*.v9dns.com <- '*' to indicate various host names in this domain.
v2.3322pay.com
bjcgsm.com
sf5100.com
Â
'Security_News > 해외보안소식' 카테고리의 다른 글
사물인터넷 확산에 따른 스마트 가전 보안위협 증가 전망 (0) | 2014.05.22 |
---|---|
美 일부 교통신호센서, 인증 암호없이 데이터 전송으로 보안에 취약 (0) | 2014.05.22 |
블랙쉐이드 RAT 연루자 전세계 100여명 구속 (0) | 2014.05.21 |
시스코 CEO, NSA설치 백도어 경제에 악영향 (0) | 2014.05.21 |
中, 美와의 사이버보안 협력 연기 (0) | 2014.05.21 |