OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     09.03.20 04:30l 84 Lines 3251 Bytes #999 (0) @ WW
BID : 2449HB1PMS
Read: GAST
Subj: More than 600 Microsoft Subdomains Pose Threat to
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200308/2210Z 8804@HB1BBS.ZL.NLD.EU BPQ6.0.19

Van: HB1PMS@HB1BBS.ZL.NLD.EU

More than 600 Microsoft Subdomains Pose Threat to Users
Hijacking Microsoft subdomains would provide attackers the liberty to bypass 
even the most elite anti-spam.
Microsoft acknowledged that this is a common attack method that involves 
misleading targets in clicking on a specially crafted malicious link.

A research firm found more than 600 legitimate Microsoft subdomains could be 
hijacked and abused for phishing, malware delivery, and scams. 

What happened?

Researchers revealed that Microsoft’s DNS records for a subdomain point to a 
domain that no longer exists.

In this case, anyone can use this opportunity to creates the non-existent 
domain and hijack the subdomain with the misconfigured DNS records.
Researchers created an automated system and scanned all the subdomains of 
some important Microsoft domains. 
The scan results revealed the existence of over 670 subdomains that could be 
hijacked using the above technique.

The damage it may cause

An attacker can potentially direct the visitors of the hijacked subdomain to 
a phishing website.

Hijacking Microsoft subdomains would provide attackers the liberty to bypass 
even the most elite anti-spam and email security tools in the network 
system. 
It can be further exploited to acquire authentication credentials or other 
sensitive information. 
Attackers can trick users into installing malware, uploading sensitive 
files, or scam them.

Key findings

To understand how the attack works, researchers have published a blog post 
describing their findings.

The researchers have reported around a dozen of the impacted subdomains to 
Microsoft.
The reported subdomains include mybrowser[.]microsoft[.]com, 
identityhelp.microsoft[.]com, data.teams.microsoft[.]com, 
webeditor.visualstudio[.]com, and sxt.cdn.skype[.]com.
Microsoft acknowledged that this is a common attack method that involves 
misleading targets in clicking on a specially crafted malicious link.


Closing lines

Earlier, several warnings about the risks posed by subdomain hijacking have 
been made. Microsoft took steps to address the issue. But, going by the 
recent findings, there are still hundreds of domains that could be abused.

?However, to mitigate such threats, researchers suggested exercising caution 
while working through links or files from untrusted sources and email 
addresses.


73 Henk.

======================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZLD.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

======================================================================

** Host of BPQ Netrom/Node NLDHUB::NL9HUB 85.214.163.10 UDP 93  

======================================================================
** This message is generated with Sally 7.2.033
----------------------------------------------------------------------
** Timed zondag 08 maart 2020  23:07 West-Europa (standaardtijd)
** BBS HB1PMS@HB1BBS.ZL.NLD.EU





Lese vorherige Mail | Lese naechste Mail


 23.11.2024 13:46:21lZurueck Nach oben