NSA warns fast flux threatens national security. What is fast flux anyway?
arstechnica.com
HIGHLY RESILIENT C2S NSA warns fast flux threatens national security. What is fast flux anyway? Used by nation-states and crime groups, fast flux bypasses many common defenses. Dan Goodin Apr 4, 2025 4:17 pm | 3 Credit: Getty Images Credit: Getty Images Story textSizeSmallStandardLargeWidth *StandardWideLinksStandardOrange* Subscribers only Learn moreA technique that hostile nation-states and financially motivated ransomware groups are using to hide their operations poses a threat to critical infrastructure and national security, the National Security Agency has warned.The technique is known as fast flux. It allows decentralized networks operated by threat actors to hide their infrastructure and survive takedown attempts that would otherwise succeed. Fast flux works by cycling through a range of IP addresses and domain names that these botnets use to connect to the Internet. In some cases, IPs and domain names change every day or two; in other cases, they change almost hourly. The constant flux complicates the task of isolating the true origin of the infrastructure. It also provides redundancy. By the time defenders block one address or domain, new ones have already been assigned.A significant threatThis technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection, the NSA, FBI, and their counterparts from Canada, Australia, and New Zealand warned Thursday. Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious servers by rapidly changing Domain Name System (DNS) records. Additionally, they can create resilient, highly available command and control (C2) infrastructure, concealing their subsequent malicious operations.A key means for achieving this is the use of Wildcard DNS records. These records define zones within the Domain Name System, which map domains to IP addresses. The wildcards cause DNS lookups for subdomains that do not exist, specifically by tying MX (mail exchange) records used to designate mail servers. The result is the assignment of an attacker IP to a subdomain such as malicious.example.com, even though it doesnt exist.Fast flux comes in two variations. Single flux creates DNS A records or AAAA records to map a single domain to many IPv4 or IPv6 addresses, respectively. Heres a diagram illustrating the structure.Double flux provides an additional layer of obfuscation and resiliency by, in addition to changing IP addresses, cycling through the DNS name servers used in domain lookups. Defenders have observed double flux using both Name Server (NS) and Canonical Name (CNAME) DNS records. Heres an illustration of the technique.Both techniques leverage a large number of compromised hosts, usually as a botnet from across the Internet that acts as proxies or relay points, making it difficult for network defenders to identify the malicious traffic and block or perform legal enforcement takedowns of the malicious infrastructure, Thursdays advisory explained. Examples of fast flux use in the wild include:So-called bulletproof hosting serviceswhich offer hardened Internet hosting services to crime-based groupsthat provide fast flux as a means of differentiating themselves from competitorsRansomware attacks from groups such as Hive and NefilimUse of the technique by a Kremlin-backed actor known as GamaredonThe advisory provides several defenses organizations of all sizes should employ to detect and block fast flux networks.Dan GoodinSenior Security EditorDan GoodinSenior Security Editor Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82. 3 Comments
0 Σχόλια ·0 Μοιράστηκε ·43 Views