Most agencies secured against DNS tampering, DHS officials say

 

Connecting state and local government leaders

A "handful" of federal agencies still have yet to fully comply with a January 2019 emergency directive on DNS tampering, according to a Department of Homeland Security official.

A "handful" of federal agencies still have yet to fully comply with a January 2019 emergency directive on DNS tampering, according to a Department of Homeland Security official.

At a March 21 meeting of the Information Security and Privacy Advisory Board, Michael Duffy, acting deputy director of the Federal Network Resilience Division, briefed members on the federal government's response to a two-year global DNS tampering campaign uncovered in January.

In early January, Duffy said DHS was initially contacted by an unnamed hosting provider who claimed domains were being maliciously redirected. Cybersecurity and Infrastructure Security Agency  reached out to industry partners and other organizations, who reported back similar feedback.

By Jan.  9, both Cisco Talos and FireEye had published research on a global DNS hijacking campaign affecting governments, telecoms and internet infrastructure entities on multiple continents, including North America. On Jan. 22, DHS issued its first-ever emergency directive, listing four action items for every civilian federal agency: audit internal DNS logs, change associated passwords, implement multi-factor authentication and begin regularly monitoring Certificate Transparency logs.

Duffy confirmed many elements of previous reporting  on what DHS knew about the campaign and the extent of its impact on U.S. government agencies during and immediately after the directive was issued. At the time, he said the department had inconclusive information from outside sources indicating traffic from some agency domains could have passed through compromised domains.

"We did hear from our industry partners that agency domains were swept up as part of a set of information that [indicated] 'I don't know, we see a couple .govs in there,'" said Duffy. "At the time, we didn't know if that meant they had been had or if they were just part of a set of domains that just went through the internet pipeline."

Duffy said the agency now believes no federal agencies were directly impacted by the campaign, echoing remarks made by at CISA Assistant Secretary of Cybersecurity Jeanette Manfra, who said in February that the agency had no evidence indicating any federal domains had been hijacked.

However, he told the board that monitoring for DNS threats across the government across agencies prior to the order was "inconsistent" and that congressional staffers briefed on the matter shortly after the partial government shutdown ended said DHS officials told them they could not be certain agency domains weren't compromised at some point in the past.

In an interview after the briefing, Duffy said CISA is "confident with what agencies have given us" from historical logs since January to make the assessment.

Duffy said there are only "a handful" of agencies left who have yet to complete all four requirements listed in the directive, most of whom are dealing with "external dependencies" on DNS providers and other partners that make it more difficult to implement multifactor authentication.

CISA is still looking for tools and services that would help detect attempts to tamper with agency domains sooner. Its 2020 budget requests $4.4 million to procure a centralized DNS name resolution service.

Duffy said that parameters for what DHS wants the service to provide are still being sketched out, but that it would focus on tracking agency traffic after it left federal networks. Doing so could provide the government with capabilities to detect malicious DNS tampering earlier than by monitoring Certificate Transparency and agency audit logs.

"It's really looking at the DNS egress side of things," Duffy said. "One of the things I mentioned [in the briefing] is that we didn't have the visibility that would have been beneficial to know what was happening, so this service would sit on top of traditional DNS and give us that level of visibility of the DNS traffic and where it's moving."

This article was first posted on FCW, a sibling site to GCN.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.