. | . |
Warning issued over attacks on internet infrastructur By Glenn CHAPMAN San Francisco (AFP) Feb 23, 2019 Key parts of the internet infrastructure face large-scale attacks that threaten the global system of web traffic, the internet's address keeper warned Friday. The Internet Corporation for Assigned Names and Numbers (ICANN) declared after an emergency meeting "an ongoing and significant risk" to key parts of the infrastructure that affects the domains on which websites reside. "They are going after the internet infrastructure itself," ICANN chief technology officer David Conrad told AFP. "There have been targeted attacks in the past, but nothing like this." The attacks could date back to 2017 but have sparked growing concerns from security researchers in recent weeks, which prompted the special meeting of ICANN. The malicious activity targets the Domain Name System or DNS which routes traffic to intended online destinations. ICANN specialists and others say these attacks have a potential to snoop on data along the way, sneakily send the traffic elsewhere or enable the attackers to impersonate or "spoof" critical websites. "There isn't a single tool to address this," Conrad said, as ICANN called for an overall hardening of web defenses. US authorities issued a similar warning last month about the DNS attacks. "This is roughly equivalent to someone lying to the post office about your address, checking your mail, and then hand delivering it to your mailbox," the US Department of Homeland Security said in a recent cybersecurity alert. "Lots of harmful things could be done to you (or the senders) depending on the content of that mail." - Middle East targets - So-called "DNSpionage" attacks might date back to at least 2017, according to FireEye senior manager of cyber espionage analysis Ben Read. The list of targets included website registrars and internet service providers, particularly in the Middle East. "We've seen primarily targeting of email names and passwords," Read said. "There is evidence that it is coming out of Iran and being done in support of Iran." DNSpionage hackers appeared intent on stealing account credentials, such as email passwords, in Lebanon and the United Arab Emirates, according to Adam Meyers, vice president of intelligence at CrowdStrike cyber security firm. Similar attacks took place in Europe and other parts of the Middle East, with targets including governments, intelligence services, police, airlines, and the oil industry, cybersecurity specialists said. "You definitely need knowledge of how the internet works and you have to handle a lot of traffic being directed to you," Meyers said of the DNSpionage hackers. "With that access, they could temporarily break portions of how the internet works. They chose to intercept and spy on folks." The attack itself is technically simple, but its scope and targeting of internet service providers along with large government entities made it "a big deal," according to Meyers. - Digital signatures - ICANN is putting out word to website and online traffic handlers to ramp up security or leave users vulnerable to being tricked into trusting the wrong online venues. The organization urged broader implementation of DNSSEC technology that adds digital signatures that act as virtual seals of sorts to expose when data moving online has been tampered with. DNSSEC can also prevent internet users from being misdirected from intended websites, according to ICANN. "It aims to assure that Internet users reach their desired online destination by helping to prevent so-called 'man in the middle' attacks where a user is unknowingly re-directed to a potentially malicious site," ICANN said in the release. Part of the challenge to keeping the internet infrastructure safe is that website owners don't always grasp the imperative guarding against wily hackers, according to Conrad. "We want to make sure people understand what it means to own a domain name and put it on the internet," Conrad said. "Because, all of your customers are only as secure as you are."
Australia says 'state actor' hacked parties, parliament Sydney (AFP) Feb 18, 2019 Australia on Monday said a "sophisticated state actor" had hacked the country's main political parties and parliament, just weeks before a closely fought election. Prime Minister Scott Morrison told lawmakers that investigators looking into a hack of parliament computer systems revealed two weeks ago "also became aware that the networks of some political parties" had been breached. "Our cyber experts believe that a sophisticated state actor is responsible for this malicious activity," he said. ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |