Skip to content Skip to sidebar Skip to footer

Bugs in Managed DNS Services Cloud Let Attackers Spy On DNS Traffic

A new class of vulnerabilities impacting major DNS-as-a-Service providers allow attackers to exfiltrate sensitive information from corporate networks. The exploitation process hinges on registering a domain on Amazon’s Route53 DNS service (or Google Cloud DNS) with the same name as the DNS name server. Amazon and Google have since patched the issues, the Wiz research team has also released a tool to let companies test if their internal DDNS updates are being leaked to DNS providers or malicious actors. The findings were presented at the Black Hat USA 2021 security conference last week.


Sign Up to Our Newsletter

Be the first to know the latest updates