[dns-operations] Questions about 13-character pseudo-random query storms

Matthias Seitz matthias.seitz at switch.ch
Wed Oct 10 11:28:06 UTC 2018


Hi Jacob,

DGA domains are also used in ad networks / cryptojacking, see

http://blog.netlab.360.com/who-is-stealing-my-power-iii-an-adnetwork-company-case-study-en/

For the current (hourly generated) DGA list in the above article, see
https://github.com/Yhonay/antipopads/blob/master/popads.txt

Cheers,
Matthias

On 09.10.18 22:50, Jake Zack wrote:
> Hey all,
> 
>  
> 
>                 CIRA is seeing a spike in 13-character pseudo-random
> queries for two of the ~40 TLD’s we host on our anycast platform.
> 
>  
> 
> 1)      The goal likely isn’t of a DDoS nature as the volumes are too
> small and steady.
> 
>  
> 
>                                 We’re talking < 15,000 qps total across
> two clouds with nodes in a dozen+ sites.
> 
>  
> 
> 2)      This has been going on for at least two weeks.
> 
>  
> 
>                                 This didn’t hit the threshold for
> alerting, so it largely went unnoticed until our Hadoop team doing
> analytics and monthly reports pointed it out.
> 
>  
> 
> 3)      The traffic appears to be mostly sourced from Europe.
> 
>  
> 
>                                 Our sites in Europe in each of our
> clouds are taking about 90% of these DNS queries.
> 
>                                 A check of the IP’s hitting our servers
> in Europe show European ownership for all of the heavy-hitters.
> 
>  
> 
> 4)      The queries do not appear to be spoofed.
> 
>  
> 
>                                 We see the same “random” query string
> from 2 or 3 IP’s in the same subnet in quick succession, from which we
> see non-pseudorandom queries, which would indicate standard use of a
> legit set of recursive DNS servers.  Vast majority are not open resolvers.
> 
>  
> 
> 5)      The same “random” string appears occasionally in the query sets
> for each of the TLD’s in question.
> 
>  
> 
>                                 Example:  ff5ae6d7e1981.<TLD>,
> 788c439b7adf3.<TLD>
> 
>  
> 
>                 This very much feels like your standard malware using
> DNS domain generation algorithms for C&C.  Am I missing anything, or is
> my deduction likely correct?
> 
>  
> 
>                 Anyone else seeing activity like this sourced almost
> exclusively from Europe in it’s geographic distribution?
> 
>  
> 
>                 I’m guessing it’s not worth contacting the recursive
> server operators at this non-impacting volume, but I’d like to rule out
> any other motivations besides malware C&C.
> 
>  
> 
> Thanks all,
> 
>  
> 
> -Jacob Zack
> 
> DNS Architect – CIRA (.CA TLD)
> 
> 
> 
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations



More information about the dns-operations mailing list