A major flaw in the way the internet works could lead to millions of people being targeted by criminals and has prompted the “largest security update” in web history.

The bug – described as “cache poisoning” – has led to some of the technology industry’s largest companies scrambling to come up with a solution before hackers discover how to exploit the flaw.

Dan Kaminsky, an American internet security specialist who uncovered the bug, has been working with major technology companies including Microsoft and Cisco to issue software patches to prevent attacks from working.

“This is the largest synchronised security update in the history of the internet. The severity of this bug is shown by the number of those who are on board with the patches,” Kaminsky said.

The flaw exploits the internet’s address mechanism, known as the Domain Name System (DNS). The glitch allows hackers to inject themselves into the process, intercepting the name entered by the user and mapping it to a different internet address than the one intended.

This would potentially allow criminals to redirect web users to phishing websites even if they had entered the correct address in the first place.

Phew! I hope the good guys get this sorted out – first.




  1. Milamberota says:

    Sent to Steve Gibson for analysis on Security Now 😀

    M

  2. ChrisMac says:

    has led to some of the technology industry’s largest companies scrambling to come up with a solution before hackers discover how to exploit the flaw.

    lol

    it’s only been this way since the start

  3. JPV says:

    Thanks for helping to alert hackers to the nature of the exploits.

    Heck of a job!!!

    Anyway, I’m sure that this is all just a ruse to allow the planting of some NSA surveillance code into the ‘Net. How many years has this flaw been in place and just NOW it’s being discovered? And the Hackers, which are magnitudes smarter and quicker then the establishment guys, didn’t discover it first?

    LOL! Give me a break!

    The FISA/Telecom immunity bill just got passed, after all.

    Wake-up folks!

  4. Dan says:

    Old News!

    A quick look in Wikipedia will give you more information. The first three external links at the end of the article are from 2007.

  5. moss says:

    RTFA #4 – yeah, cache poisoning has, in fact, been around since the early 90’s. And your point is…?

    The article is about a new response to the newest variant.

  6. it's just an expression says:

    Yea right, the prison guards are going to inform all the inmates that there is a security flaw.

  7. deowll says:

    Off course it’s safe to do on line banking, etc, on line! Ouch!

  8. moss says:

    BTW – if you’ve applied the Microsoft “patch” and run ZoneAlarm, you probably aren’t reading this comment.

    Folks are reporting, this morning, that the combination won’t allow them access to the Web – unless they reduce the protection level settings in ZoneAlarm.

    Microsoft says they’ve had no reports of any problem.

    http://tinyurl.com/6xrye2

  9. Paddy-O says:

    Umm, I remember reporting on this YEARS ago. Not exactly news.

  10. Jim W. says:

    the guys at TWiT Live (Leo and Randal Schwartz)discussed this article yesterday.

    In short, if you switch to using OpenDNS as your DNS server you are safe.

    Or if you visit http://www.doxpara.com/ you can check your DNS to see if you are vulnerable to this attack.

  11. karanua says:

    The company Phorm is doing this actively in the top three ISPs in the UK and has been for twelve months.

  12. Stu says:

    Seems like web sites could advertise their IP addresses, so users could use them instead of the dotcom URL. It would be practical for sites you bookmark, especially banking, etc. Just be sure you get the IP address from the real bank.

  13. Paulrb02 says:

    Yeah its called altering the hosts file. Thats been around for awhile now. Also you can use this “flaw” to prevent yourself from going to bad websites.

  14. Paulrb02 says:

    Also Steve already talked about this http://www.grc.com/sn/notes-045.htm


0

Bad Behavior has blocked 11607 access attempts in the last 7 days.