In this episode of Breaking Badness, we analyze two fascinating cybersecurity incidents that expose both corporate misconfigurations and hacker missteps.
DNS Errors: Security researcher Philippe Caturegli discovered a typo in MasterCard’s DNS records, which left the company open to traffic hijacking and data exposure. This long-overlooked flaw, dating back years, could have been exploited by attackers to redirect users, intercept data, and manipulate services.
When Hackers Get Hacked – The Script Kiddie Trap: In a turn of events that underscores the “no honor among thieves” trope, a threat actor baited low-skilled hackers (script kiddies) with a fake malware builder. Instead of gaining hacking capabilities, they unwittingly installed a backdoor on their own machines, allowing the original attacker to steal their data and take control of their systems.
What Happened?
Security researcher Philippe Caturegli discovered a typo in MasterCard’s DNS settings, where a misconfigured subdomain pointed to an unregistered domain (Akam.ne instead of Akam.net). This mistake went unnoticed for years, potentially allowing an attacker to:
How Was It Discovered?
Philippe purchased the unused .ne domain (a ccTLD from Niger) to test its potential impact. Due to round-robin DNS settings, his new domain started receiving traffic meant for MasterCard’s Azure cloud services. This proved that a cybercriminal could have hijacked MasterCard’s traffic and data.
Key Takeaways
Resources
Read Brian Krebs’ coverage on DNS misconfigurations
What Happened?
A threat actor lured low-skilled hackers (script kiddies) into downloading a fake malware builder. Instead of getting a functional hacking tool, they unknowingly installed a backdoor that:
How Was the Attack Carried Out?
The malware disguised itself as Xworm, a well-known Remote Access Trojan (RAT). However, when script kitties tried to use it, the software:
How It Was Stopped
Cybersecurity researchers disrupted the malware’s kill chain by:
Key Takeaways
Read CloudSek’s full report on the fake malware builder
That’s about all we have for this week, you can find us on Mastodon and Twitter/X @domaintools, all of the articles mentioned in our podcast will always be included on our podcast recap. Catch us Wednesdays at 9 AM Pacific time when we publish our next podcast and blog.
*A special thanks to John Roderick for our incredible podcast music!