DNS Vulnerability Allows For Spying On Companies

August 6, 2021

A new class of DNS affecting important DNS-as-a-Service (DNSaaS) has been discovered that could allow an attacker to gain access to sensitive information from a corporate network.

This is made possible by a simple domain registration, which hijacks a DNSaaS provider’s name server, enabling it to wiretap on dynamic DNS traffic from its customers’ networks.

This was discovered by security firm Wiz researchers Shir Tamari and Ami Luttwak.

“We found a simple loophole that allowed us to intercept a portion of worldwide dynamic DNS traffic going through managed DNS providers like Amazon and Google,” the researchers said.

The data that flows through this technique ranging from the names of employees/computers and locations to highly sensitive details about the infrastructure of organizations such as Internet-exposed network devices are then used to simplify the work of a threat actor when it comes to breaking through an organization’s network.

For more information, read the <a rel=”noopener” href=”https://www.bleepingcomputer.com/news/security/new-dns-vulnerability-allows-nation-state-level-spying-on-companies/” target=”_blank”>original story</a> in BleepingComputer.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn