nanog mailing list archives

random dns queries with random sources


From: Dale Rumph <dale.rumph () gmail com>
Date: Wed, 19 Feb 2014 11:11:35 -0500

Davis,

Having seen this in the past, and managing both open resolvers and
authoritative servers for several large eyeball networks, I think your
assumption is correct this definitely smells like C&C traffic being handled
via DNS.

Just my 2c - YMMV - All sales final, As is

- Dale Rumph
- Network Engineer/Security Consultant
On Feb 19, 2014 10:58 AM, "Beeman, Davis" <Davis.Beeman () integratelecom com>
wrote:

I am late to this train, but it appears no one else has brought this up.
 It is a DNS tunneling setup, not an attack.  I have been dealing with one
of these lately as well.  They were using some open resolvers in my network
to reflect, but the "random" hostnames in the queries are tunneled traffic
or keywords.  The original sources of the traffic are probably members of a
botnet, and this is being used as a sneaky C&C method.   Due to the tiny
amount of data you can send in the DNS query name field, this will sort of
look like an attack, because they have to send thousands of queries to get
anything done.

They are not attacking the authoritative name servers in those domains, as
has been suggested, rather the authoritative name server in these domains
is the rouge DNS server in use by the bad actor running a botnet.

Davis Beeman
Network Security Engineer


-----Original Message-----
From: Joe Maimon [mailto:jmaimon () ttec com]
Sent: Tuesday, February 18, 2014 19:08
To: North American Networking and Offtopic Gripes List
Subject: random dns queries with random sources

Hey all,

DNS amplification spoofed source attacks, I get that. I even thought I was
getting mitigation down to acceptable levels.

But now this. At different times during the previous days and on different
resolvers, routers with proxy turned on, etc...

Thousand of queries with thousands of source ip addresses.

According to my logs, sources are not being repeated (or not with any
significant frequency)

What is the purpose of this?

18-Feb-2014 21:45:24.982 queries: info: client 38.89.3.12#19391: query:
swe.5kkx.com IN A + (66.199.132.5)
18-Feb-2014 21:45:25.067 queries: info: client 4.109.210.187#55190:
query: ngqrbwuzquz.5kkx.com IN A + (66.199.132.7)
18-Feb-2014 21:45:25.105 queries: info: client 91.82.209.221#33924:
query: bgbtqcdtzen.5kkx.com IN A + (66.199.132.7)
18-Feb-2014 21:45:25.106 queries: info: client 6.29.8.224#4379: query:
uehkaiy.5kkx.com IN A + (66.199.132.7)
18-Feb-2014 21:45:25.106 queries: info: client 67.27.41.169#44000:
query: yqv.5kkx.com IN A + (66.199.132.7)
18-Feb-2014 21:45:25.107 queries: info: client 45.207.31.218#30585:
query: e.5kkx.com IN A + (66.199.132.7)
18-Feb-2014 21:45:25.644 queries: info: client 95.217.89.95#5396: query:
bfpofpj.5kkx.com IN A + (66.199.132.5)
18-Feb-2014 21:45:25.823 queries: info: client 89.47.129.187#12316:
query: aocdesguijxym.5kkx.com IN A + (66.199.132.5)
18-Feb-2014 21:45:26.021 queries: info: client 15.205.106.62#34265:
query: xqgyahfugnt.5kkx.com IN A + (66.199.132.7)
18-Feb-2014 21:45:26.057 queries: info: client 128.64.33.29#7584: query:
ijwhqfmpohmj.5kkx.com IN A + (216.222.148.103)
18-Feb-2014 21:45:26.330 queries: info: client 102.206.85.254#8093:
query: ibojknsrqjohib.5kkx.com IN A + (216.222.148.103)
18-Feb-2014 21:45:26.333 queries: info: client 40.121.221.81#10822:
query: ebb.5kkx.com IN A + (66.199.132.5)
18-Feb-2014 21:45:26.752 queries: info: client 104.55.169.43#30108:
query: l.5kkx.com IN A + (66.199.132.7)





Current thread: