New York Times site hack shifts attention to registry locks

Mechanism provides relatively easy way to mitigate risk of unauthorized DNS changes, security researchers say

By , Computerworld |  Internet

One way that owners of major websites can mitigate the risk of their domains being hijacked like The New York Times' site was on Tuesday is to apply what is known as a registry lock on the domain, security researchers say.

A registry lock is basically a mechanism under which any requests for changes to a domain name server have to be manually verified and authenticated by a top-level domain owner like Verisign and NeuStar, which operate the dotcom and dotbiz domains respectively.

A registry lock provides an additional layer of protection against DNS tampering and is particularly useful in situations where a domain name registrar might be compromised, the security researchers said.

On Tuesday, The Times blamed a prolonged website outage on a hacking attack at the company's Australia-based domain name registrar, Melbourne IT.

The Times said hackers belonging to the Syrian Electronic Army (SEA) gained access to the company's DNS records by compromising its domain name registrar. The attackers then used that access to change the paper's DNS record so it was pointing to systems in Syria and Moscow.

Melbourne IT, in turn, blamed the outage on one of its resellers, whose account was apparently compromised and used to change several domain names, including that of The Times, Twitter and others.

H.D. Moore, chief research officer at security vendor Rapid7, said registry locks make it much more difficult to make such DNS changes.

Typically, changes to name servers are handled directly by domain registrars such as Melbourne IT and not by the top-level domain owners. A registry lock prevents the registrar from making any changes on its own and instead allows changes to be made only with the approval of the top-level owner.

"Instead of updating a record through your registrar's website, you have to contact the [Top Level Domain] owner instead and go through a secondary form of authentication," Moore said. "It makes sense for big brands, but does impose a maintenance penalty on organizations who change DNS providers frequently."p>

At the time of the attack, many of the major websites hosted by Melbourne IT did not have a registry lock in place, Moore said. Among the companies using Melbourne IT are Yahoo, Google, Microsoft, Ikea, AOL and dozens of other major site owners.

While there is no evidence that the attackers made changes to any of these domains, they were potentially vulnerable, Moore said. "In other words, things could have been much worse."


Originally published on Computerworld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question