31.01.2023 Views

Cyber Defense eMagazine February Edition for 2023

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Exchange (MX) and Name Service (NS) records and replace a legitimate address with their own to<br />

redirect all traffic.<br />

People naturally trust internal emails from their boss or colleagues. We rarely subscribe to the term used<br />

to call cyber criminals as “sophisticated,” however, one thing <strong>for</strong> sure is they know if they can<br />

commandeer an MX Server and take control of it, so their phishing emails now become internal emails<br />

coming from the same server and masquerading as bona fide emails, their chances of success are greatly<br />

increased as opposed to external, highly suspicious emails that can be caught by spam or virus tools.<br />

DNS plays a pivotal role in overall security. Security professionals understandably are a tad divided on<br />

the criticality of DNS due to lack of knowledge. If they have not studied, or do not fully comprehend DNS,<br />

it is often pushed back as not relevant. This is a grave error.<br />

This is more than a tremendous shame; it is a nothing short of a tragedy. Given the papers by<br />

Governments, Agencies, Emergency Directives following Federal Agency on DNS attacks, this stance is<br />

an incredibly dangerous position to adopt and maintain. The reluctance by some security professionals<br />

sadly can and does create false positives. When a company believe they are secure and receive evidence<br />

of their DNS is exposed and can be tampered with, their dismissal can overlook and ignore major exposed<br />

vulnerabilities. Such instances can lead to a ‘Doctor administering a medicinal remedy only to<br />

unknowingly administer access to the very poison killing the patient.’<br />

A cyberattack causes chaos, disruption, damages the brand and can have a negative impact and<br />

reduction on the share price. SolarWinds shares are trading at less than $10 from a high of $24 prior to<br />

their cyberattack in 2020. It is not uncommon to witness cyber security budgets greatly increased<br />

following a cyber incident and hear that “sophisticated attackers’ had gained access. What is never said<br />

is that due to oversights, errors, sometimes even negligence, access was easily achieved into the network<br />

that caused the cyber incident. Sadly, one can never rule out internal foul play.<br />

If we consider last week’s Federal Aviation Authority (FAA) ‘outage,’ an initial statement was made that<br />

a corrupt file caused the incident. Ms. Katie Arrington, the <strong>for</strong>mer CISO <strong>for</strong> the Department of Defence,<br />

said in a publicly shared LinkedIn video: ‘’Anyone who thinks this was a corrupt file issue knows nothing<br />

about cyber security.’’ Katie has been very vocal on her insight and knowledge of this ‘outage.’<br />

Our research showed that within hours following the ‘outage’ that grounded the entire United States from<br />

all flights on the 11 th of January, the Website https://notams.aim.faa.gov had replaced a critical Digital<br />

Certificate. This could of course be a coincidence. It could also be a strategic action in case the incident<br />

was more than just an outage. However, not all digital certificates were replaced.<br />

The main concern is that the FAA’s DNS was and remains suboptimal and exposed to tampering as the<br />

U.S. Government issued the 19-01 DNS Mitigation program in 2019. Due to this error, the newly issued<br />

digital certificate is not ensuring authentication, nor encryption. This oversight ensures the FAA, the FAA’s<br />

partners, and the FAA’s clients, the American public are equally as exposed to cyber incidents today as<br />

it was the day prior to the incident.<br />

An internationally recognized DNS Expert, the late Mr. Dan Kaminsky showed Microsoft DNS issues back<br />

in a secret meeting in Microsoft’s Redmond headquarters in 2008 when he, along with Dr Paul Vixie,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 109<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!