Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Microsoft’s windows.com Domain Hit with Bit-flipping
#1
Exclamation 
Quote:
[Image: Heimdal-Security-News-and-Updates-1030x360.png]

The traffic hijacking attempt has been brought up to the attention of cyber analysts.

According to security researcher Ax Sharma, a cyber analyst was able to “bit squat” Microsoft’s windows.com domain by cybersquatting variations of windows.com.

This technique differentiates itself from cases where typosquatting domains are used for phishing activities in that it expects no action on the victim’s part.

Impossible as it may sound, this is a result of a concept commonly known as bit-flipping.

To have a clear understanding of what actually happened, we need to define the two terms.
 
Quote:A bit-flipping attack is an attack on a cryptographic cipher in which the attacker can change the ciphertext in such a way as to result in a predictable change of the plaintext, although the attacker is not able to learn the plaintext itself. This type of attack is not—directly—against the cipher itself (as cryptanalysis of it would be), but against a particular message or series of messages. In the extreme, this could become a Denial-of-service attack against all messages on a particular channel using that cipher.
Quote:A BitSquatting attack leverages random errors in memory to direct Internet traffic to adversary-controlled destinations. BitSquatting requires no exploitation or complicated reverse engineering and is operating system and architecture agnostic.

Security engineer and blogger Remy noticed that out of the 32 valid domain names which were 1-bitflip permutations of windows.com, 14 were unregistered, and therefore available. Seeing that multiple such alterations of windows.com were possible, he put together a list of “bit flipped” domains.
 
Quote:
This is a rather odd occurrence as usually these are bought up by a company like Microsoft to prevent their use for phishing attempts. So, I bought them.

All of them. For ~$126.
  • windnws.com
  • windo7s.com
  • windkws.com
  • windmws.com
  • winlows.com
  • windgws.com
  • wildows.com
  • wintows.com
  • wijdows.com
  • wiodows.com
  • wifdows.com
  • whndows.com
  • wkndows.com
  • wmndows.com
While it may seem fair to ignore the concept of bitsquatting as a theoretical concern, researchers have previously noticed a decent success rate of these attacks.

In a Black Hat paper, titled “Bit-squatting DNS Hijacking without Exploitation”, security engineer Artem Dinaburg wrote:
 
Quote:During the logging period, there were a total of 52,317 bit squat requests from 12,949 unique IP addresses. When not counting 3 events that caused extraordinary amounts of traffic, an average of 59 unique IPs per day made HTTP requests to my 32 bit squat domains. These requests were not typos or other manually entered URLs, and some show signs of several bit errors.

Similarly, when Remy squatted the previously mentioned domains and setup sinkholes to record any traffic, he noticed an uptick in legitimate traffic destined to windows.com. Additionally, the researcher was also able to capture UDP traffic destined for Microsoft’s time server, time.windows.com, and TCP traffic meant to reach Microsoft’s services such as Windows Push Notification Services (WNS) and SkyDrive. While it is beyond belief that people would change their time servers to a misspelled windows.com domain, Remy outlines that there is no empirical method to prove that traffic came from bitsquatting.

Unfortunately, the fact that bitsquatting attacks remain practical to accomplish is problematic as malicious actors could create a lot of security problems for applications if their actions are successful.
...
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • Mohammad.Poorya
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AMD Ryzen 9050 “Strix Halo” specs leaked
AMD Strix Point an...harlan4096 — 11:23
Audacity 3.5.1
Changes in 3.5.1: ...harlan4096 — 09:40
Waterfox G6.0.13
Waterfox G6.0.13​ ...harlan4096 — 09:39
Google Chrome 124.0.6367.78/.79
Google Chrome 124....harlan4096 — 09:38
Brave 1.65.122
Release Channel 1....harlan4096 — 09:36

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (49)steakelask
avatar (43)Termoplenka
avatar (49)Toligo

[-]
Online Staff
There are no staff members currently online.

>