DNS attacks are costing governments worldwide huge amounts

Government organizations in each country suffer an average of 12 DNS attacks per year.

Domain Name Servers attack (DNS) is a type of attack in which crooks primarily target servers by exploiting the vulnerabilities that exist in the domain name system. Attacks on the DNS domain system, basically, can be done in a variety of ways, including but not limited to DoS, DNS and Reflected attack spoofing attacks.

With such diverse attack methods, DNS attacks have become one of the leading cyber threats to government agencies and organizations in many countries around the world. . According to a new study conducted by security service provider EnoughIP, governments around the world are suffering an average of up to $ 7 million a year. DNS attack.

DNS attacks are costing governments worldwide huge amounts Picture 1DNS attacks are costing governments worldwide huge amounts Picture 1

Specifically, government organizations in each country suffer an average of 12 DNS attacks each year, costing more than half a million dollars each time. In general, the main purpose of a hacker attempting to deploy a DNS attack includes:

  1. start and establish a connection session between the C2 server and the corporate clients that were infected
  2. Redirect visitors to phishing websites.
  3. Stealing, leaking system data.

The effects of a DNS attack include:

  1. Temporarily paralyzes the system, causing internal applications to stop working and especially important data leaks.
  2. Paralyze cloud services.
  3. Sensitive information or IP may be stolen via DNS.

It is estimated that government organizations will need at least 7 hours to get the system back to work after a typical DNS attack, and many hours later to fix 100% of the damage. All of these problems put the system at great risk of theft of internal data, especially for sensitive and high-value information such as financial data, business documents, etc.

Analyzing interactive DNS data will be one of the extremely important steps to help detect potential threats in network traffic. This requires the organization to be able to effectively collect and analyze every client-to-domain interaction.

4.5 ★ | 2 Vote