“With KeyTrap, an attacker could completely disable large parts of the worldwide Internet” — this deceptively simple cyberattack could spell doom for apps everywhere

Security researchers have discovered a major flaw in the DNS system that could “completely disable” large parts of the Internet for extended periods of time.

researchers from the National Center for Applied Cybersecurity ATHENE, Goethe University Frankfurt, Fraunhofer SIT, and the Technical University of Darmstadt, recently found a flaw in the Domain Name System Security Extension (DNSSEC), a security protocol that adds an additional layer to the Domain Name System (DNS).

With DNSSEC, DNS records get a digital signature that confirms they weren’t changed, or forged, in transit.

Fixes available

The flaw, tracked as CVE-2023-50387, was named KeyTrap, and in short – allows threat actors to mount long-lasting denial-of-service (DoS) attacks against various internet and programs. “Exploitation of this attack would have severe consequences for any application using the Internet, including unavailability of technologies such as web-browsing, e-mail, and instant messaging,” ATHENE said in an advisory. “With KeyTrap, an attacker could completely disable large parts of the worldwide Internet,” the researchers warned. 

A patch was already developed and is being deployed at press time.

Akamai’s figures show that almost a third of all internet are susceptible to KeyTrap, BleepingComputer reported.

The vulnerability, they further explained, was present in DNSSEC for more than two decades, but was never discovered or exploited due to the complexity of the DNSSEC validation requirements. The attacks would result in the denial of service lasting anywhere between a minute and 16 hours.

In early November 2023, the researchers demonstrated their findings to Google and , with whom they’ve been working on mitigations, ever since. Now, Akamai already released mitigations for its DNSi recursive resolvers, and both Google and Cloudflare deployed their patches, as well. 

While having the fixed is good news, the researchers stress that in order to be safe from future similar , the entire DNSSEC philosophy should be reevaluated. 

More from TechRadar Pro

Source link