Russia is using DNS and DPI to block YouTube, Telegram and WhatsApp while pushing state-controlled MAX as alternative

VPNs are the only way Russians can access the platforms β€” for now

TechRadar

πŸ“’ πŸ›œ ⚠️ Old routers in 30+ countries had DNS settings hijacked, routing traffic through servers linked to a sanctioned Russian bulletproof host before sending users to malicious sites.

Read: https://hackread.com/sanctioned-bulletproof-host-hijack-old-home-routers/

#CyberSecurity #DNSHijack #Router #CyberAttack #CyberCrime

Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers

A DNS hijacking campaign abusing old home routers redirected traffic via servers run by Aeza International, a US sanctioned Russian hosting provider.

Hackread - Cybersecurity News, Data Breaches, AI and More
Smashing Security podcast #381: Trump shooting conspiracy, Squarespace account hijack, and the butt stops here - Social media fuels conspiracies galore after Donald Trump is shot at a rally, cryptocurre... https://grahamcluley.com/smashing-security-podcast-381/ #smashingsecurity #vulnerability #donaldtrump #squarespace #lawβ„΄ #dnshijack #instagram #phishing #podcast #google #meta
Smashing Security podcast #381: Trump shooting conspiracy, Squarespace account hijack, and the butt stops here

Social media fuels conspiracies galore after Donald Trump is shot at a rally, cryptocurrency websites are hijacked after a screw-up at Squarespace…

Graham Cluley

Yesterday Bill Toulas of Bleeping Computer wrote:

"DNS hijacks target crypto platforms registered with Squarespace" (https://www.bleepingcomputer.com/news/security/dns-hijacks-target-crypto-platforms-registered-with-squarespace/):

Β« A wave of coordinated DNS hijacking attacks targets decentralized finance (DeFi) cryptocurrency domains using the Squarespace registrar, redirecting visitors to phishing sites hosting wallet drainers. Β»

Not mentioned is that the attackers probably attemped (and possibly succeeded) to obtain valid https certificates for their fake servers. A bit of research using crt.sh (and VirusTotal) reveals the following i.r.t. the four DeFi domains mentioned in the article, in the same order of appearence.

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
1) compound.finance
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
They seem to be unaffected: according to https://crt.sh/?q=compound.finance *NO* certificates were approved since July 5.

Note that it is very irresponsible behavior of GTS (Google Trust Services) to *not always* (but rather *sometimes*, like https://crt.sh/?id=13624751017) log leaf certificates in the CT (Certificate Transparency) ledger (Google *does* always seem to log precertificates, but precisely in a case like this they are *less* interesting).

For more info on the erratic GTS behavior, the pointlessness of short lived certs and the difference between a "precertificate" and a "leaf certificate", see my response to this toot (which I'll add later).

β€”β€”β€”β€”β€”β€”β€”β€”β€”
2) celer.network
β€”β€”β€”β€”β€”β€”β€”β€”β€”
According to https://crt.sh/?q=celer.network, one precertificate was issued on July 11: https://crt.sh/?id=13694629335 (by LE = Let's Encrypt). Because LE leaf certs are always logged to CT, it looks like someone prevented counter signers from issuing a usable certificate - that would be a near success (for the attackers)

Note #1: at the top of https://crt.sh/?id=13694629335 one can read that Digicert and Sectigo already had countersigned this precertificate.

Note #2: in 2022 a DV certificate was issued for cbridge-prod2.celer.network which, as the result of a deliberate BGP hijack, led to a totally different attacker-owned server: https://arstechnica.com/information-technology/2022/09/how-3-hours-of-inaction-from-amazon-cost-cryptocurrency-holders-235000/ (more details here: https://www.certik.com/resources/blog/1NHvPnvZ8EUjVVs4KZ4L8h-bgp-hijacking-how-hackers-circumvent-internet-routing-security-to-tear-the).

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
3a) pendle.finance
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
As can be seen in https://crt.sh/?q=pendle.finance, a precert and a leaf cert (https://crt.sh/?id=13700814700&opt=ocsp) have been issued on July 11 by Sectigo, most likely to the attackers (*). This cert is valid for 1 year.

And it has not yet been revoked!

This means that, *if* it is in the hands of attackers (provided that they possess the associated private key, a certificate is public), it can be used in attacks where DNS-responses to individuals are forged.

(*) Because of the date (July 11) and because the owners of '*.pendle.finance' and 'pendle.finance' did not need a new "1 year valid" cert at all (I'd expect a new request in Jan. 2025):
2024-07-11 - 2025-07-11 <= weird
2024-02-13 - 2025-02-12 (2x)
2023-03-06 - 2024-03-05

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
3b) pendle.fi (==> pendle.finance)
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
https://crt.sh/?q=pendle.fi reveals that one precert was issued specifically for 'campaign.pendle.fi' on July 11.

Zooming in to https://crt.sh/?q=campaign.pendle.fi reveals one precertificate, issued by LE; like the 'celer.network' precert this attack appears to have been stopped in time (provided that crt.sh would have been updated by now *if* the leaf cert was actually issued.

Note #1: the owners of 'pendle.fi' had not used that subdomain name 'campaign' before (OTOH 'campaign.pendle.finance' was used before). So this may have been a carefully planned attack where a *subdomain* was added to the DNS records of 'pendle.fi', a technique called "domain shadowing" (https://unit42.paloaltonetworks.com/domain-shadowing/).

Note #2: in https://crt.sh/?spkisha256=5e3bbe888394436be58b950a67af6be91877992d73258e237030ce1db6bd4114 can be seen that a GTS leaf cert was logged to CT on July 11, while the corresponding precert had been logged on May 27 (such delayed logging sucks, but apparently it was not obtained by the attackers).

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
4) unstoppabledomains.com
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
Although I found some weird things i.r.t. certificates issued for this domain, I found no evidence that attackers managed to obtain DV certs for their servers impersonating "unstoppable domains".

β€”β€”β€”β€”β€”β€”β€”
Conclusion
β€”β€”β€”β€”β€”β€”β€”
Again DeFi sites have been subjected to attacks. It looks like most attacks were detected in an early stage, but some users may have been unlucky by accessing fake sites for the time they existed.

I'm not fully sure whether the 'pendle.finance' leaf cert issued by Sectigo was requested by the legitimate domain owner, or by attackers (it has not been revoked).

IMO, DV certs (even short lived ones, bacause *hours* may suffice for attackers) do not sufficiently protect against BGP or DNS hijack attacks, and neither against "legitimate" Man-in-the-Middle proxying as used by parties like Cloudflare and Fastly (https://infosec.exchange/@Bitwiper/112772374882006712), or by "near the server" MitM attackers (https://notes.valdikss.org.ru/jabber.ru-mitm/).

@BleepingComputer @billtoulas

#DV #DomainValidated #Certificates #DeFi #Crypto #CryptoCoins #BGPHijack #DNSHijack #DNS #BGP

DNS hijacks target crypto platforms registered with Squarespace

A wave of coordinated DNS hijacking attacks targets decentralized finance (DeFi) cryptocurrency domains using the Squarespace registrar, redirecting visitors to phishing sites hosting wallet drainers.

BleepingComputer
Cryptocurrency exchange Liquid suffers security breach, user data exposed

Cryptocurrency exchange Liquid has revealed that it was hacked last week, after a malicious attacker managed to seize control of its DNS records, seized control of some internal email accounts…

Graham Cluley
Cryptocurrency exchange Liquid suffers security breach, user data exposed - Cryptocurrency exchange Liquid has revealed that it was hacked last week, after a malicious attack... https://grahamcluley.com/cryptocurrency-exchange-liquid-suffers-security-breach-user-data-exposed/ #securitythreats #cryptocurrency #dnshijack #exchange #liquid #dns
Cryptocurrency exchange Liquid suffers security breach, user data exposed

Cryptocurrency exchange Liquid has revealed that it was hacked last week, after a malicious attacker managed to seize control of its DNS records, seized control of some internal email accounts…

Graham Cluley
Teenage TalkTalk hacker accused of $800,000 cryptocurrency theft in the United States - Elliott Gunton – aka β€œGlubz” – is charged in relation to the December 2017 security breach of cryp... more: https://www.grahamcluley.com/teenage-talktalk-hacker-accused-of-800000-cryptocurrency-theft-in-the-united-states/ #securitythreats #cryptocurrency #etherdelta #law&order #dnshijack #phishing #talktalk
Teenage TalkTalk hacker accused of $800,000 cryptocurrency theft in the United States

Elliott Gunton – aka β€œGlubz” – is charged in relation to the December 2017 security breach of cryptocurrency exchange EtherDelta.