BNMC Blog

How the Democratic Republic of Congo Provided a Security Case Study

How the Democratic Republic of Congo Provided a Security Case Study

Preserving cybersecurity requires the person responsible for doing so to consider every component and connection associated with their technology, down to the smallest minutiae. Let’s consider a sizable example that comes from a narrowly avoided disaster in the Democratic Republic of Congo, that could have potentially left millions of Internet users exposed to serious threats.

Before we begin, it is important to understand how websites work, as it pertains to the nature of the threat.

How a Web Browser Actually Works

On the surface, navigating to a website is a somewhat straightforward process: type in the URL, hit Enter, and you’re off to the races, right?

Maybe so. However, this simple interaction hides a much more involved process taking place behind the scenes.

When we think of a website, as users, we think of a certain name, like Google or Facebook or what have you. That’s known as the domain name, and it isn’t what your Internet browser uses to find the website you want. Your browser operates via something known as an Internet Protocol (IP) address. While IP addresses are way too in-depth to review in full here, all we have to keep in mind is that they’re kind of like the coordinates to the websites that your browser is attempting to find.

IP addresses are made up of a series of numbers, which are more challenging to remember than a name. Therefore, something known as nameservers exist: they help connect the URL we know to the IP address your browser recognizes.

Each time you type in a URL, your browser references a nameserver to match it to the IP address of the correct webserver. Once it does so, it can request the content you want. In this way, the nameserver is effectively your browser’s translator—taking your input and converting it to be understood.

That’s what makes the nameserver so important to the function of the Internet, and why these nameservers are so important to keep secure. This importance is only exacerbated when the nameserver controls a top-level domain—the “.com”,”.net”, “.org” or whatever the case may be.

So, if an attacker were to get control of a top-level nameserver, man-in-the-middle attacks would be far too easy for cybercriminals to use to redirect web traffic to malicious websites.

The Situation in the Democratic Republic of Congo

A security researcher named Fredrick Almroth noticed that one of the nameservers controlling a top-level domain for the Democratic Republic of Congo—specifically, the one controlling the .cd country code—was due to expire. With an expiration date set in mid-October, the government would have a limited time after that to claim the nameserver domain scpt-network.com. Almroth took it upon himself to monitor the domain.

Once December was soon to end, Almroth picked up the domain to keep it safe from attackers. Since the domain’s other nameserver was still operational, all Almroth had to do is timeout any requests to the expired nameserver and redirect them to the operational one.

The Risks Involved

If Almroth had not claimed the nameserver’s domain, an attacker may have. In doing so, this attacker could then intercept all traffic that was directed toward any .cd domain, even if it were encrypted. An attacker in this position would therefore have a truly frightening level of power over thousands of websites.

The Congolese government wound up cutting their losses and setting up a new domain, so there was fortunately never a time that the .cd domain was at risk.

What Your Business Can Take Away from This

Simply put, technology is a complicated thing, and this opens a lot of opportunities for cybercriminals to exploit.

This incredibly resourceful class of criminal isn’t above using cheap tricks to infiltrate their targets, and most of them aren’t particular about the size of a given target. Some attackers focus on small businesses while some aim higher at government infrastructures. This is what makes it so important that all organizations have some resource to turn to that can see to their efficiency and cybersecurity alike.

BNMC is here to be that resource for you. Our team focuses in on the IT used by our clients to help resolve issues, whether operational or security-based, to ensure that nothing goes by unnoticed. To learn more about what we can do for you, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 27 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Software Workplace Tips Network Security Microsoft Hackers Efficiency Business Google Hosted Solutions Data Hardware Computer IT Services Malware Communication IT Support Mobile Devices Internet Small Business Android Mobile Device Smartphone Cloud Computing Tech Term Backup Innovation Phishing Users Ransomware Data Recovery Managed IT Services Smartphones Saving Money Windows Quick Tips Information VoIP Outsourced IT Upgrade Miscellaneous Cybersecurity Network Disaster Recovery Passwords Facebook Data Backup communications Social Media Microsoft Office Browser Windows 10 Server Office 365 Business Continuity Business Management Internet of Things Managed IT Services Managed Service Collaboration Productivity COVID-19 Data Management Apps Windows 10 Save Money Gadgets Vulnerability Remote Work Remote Monitoring Analytics App Gmail Artificial Intelligence Word Chrome Managed Service Provider Router Mobile Office Government Conferencing Infrastructure Remote Workers Money Encryption WiFi Settings Information Technology Google Drive Applications Employer-Employee Relationship Networking Virtual Reality Access Control VPN Paperless Office Company Culture Website Holiday BYOD Display IT Support Spam Tip of the week Robot Antivirus HIPAA Document Management BDR Bandwidth Automation Content Filtering Wireless End of Support Education Apple Compliance YouTube Data Security Storage IT Management Risk Management Business Technology Virtual Private Network Wi-Fi Computers Office Tips Employee-Employer Relationship Managed Services Unified Threat Management Hacker Data storage Development Big Data Firewall Maintenance Operating System Avoiding Downtime Chromebook Hosted Solution Marketing Humor Customer Relationship Management Scam Administration Best Practice Vendor Mobile Security Solid State Drive Mouse Break Fix Search Identity Theft Going Green Training iOS Remote Computing Hard Disk Drive Business Intelligence Printing Server Management SaaS Password Touchscreen Regulations Virtualization Managed IT MSP Tablet Augmented Reality Data loss How To Telephone Systems Retail Alert Laptop Managing Stress The Internet of Things desktop OneNote Computing Data Breach Outlook Windows 7 Two-factor Authentication IT Bring Your Own Device Software as a Service Monitors Social Network Cybercrime LiFi Managed IT Service Vendor Management Downtime Social Employees Screen Reader Charging Uninterrupted Power Supply Slack Hard Disk Drives Specifications Smart Office Spyware Typing Print Toner Myths Wires File Sharing Current Events Messaging Heating/Cooling Multi-Factor Security Social Engineering Holidays Licensing Dongle Computer Care IBM Content Huawei Banking Entertainment Time Management Printer Twitter Distribution Assessment Digital Signage Data Warehouse Websites Procedure Solar Gig Economy Smart Tech Monitoring Solid State Drives Black Friday Work Cryptocurrency Shortcuts Mobile Management Voice over Internet Protocol IT solutions Employee-Employer Relationships Servers Google Calendar Safety Payment Card Cooperation Service Level Agreement Halloween Corporate Profile Google Docs Streaming Processor Emergency Reviews Hacks Hybrid Cloud Network Management Logistics Hotspot Internet Exlporer G Suite Troubleshooting Business Analysis Dark Web PCI DSS Automobile Network Congestion FBI Connectivity Dell Google Wallet Spying National Security Cyber Monday IT Technicians Optimization Bitcoin Security Cameras Profiles Modem FinTech Cabling Analysis Students Legislation Inventory Staff Leominster Scary Stories WannaCry Business Growth Human Error Memory Remote Scalability SharePoint Writing Asset Management Language Value Running Cable Legal Virus Microsoft Excel Battery Google Maps Techology K-12 Education IoT Unified Communications Drones Updates Smart Technology Peripheral Mirgation Recycling Buisness Windows 8 Utility Computing user treats Cookies Virtual Desktop Mixed Reality Statistics Shadow IT K-12 Schools Sports Device Reducing Cost Lenovo Dark Data Update Mobile Device Management Migration Consulting Downloads Memes Computing Infrastructure Professional Services Deep Learning LED Threats Mail Merge Blockchain Files Social Networking VoIP Unified Threat Management Instant Messaging Star Wars PowerPoint Shortcut Distributed Denial of Service Politics Management Chatbots eWaste Digital Payment Laptops Shopping Nanotechnology Meetings Disaster Bluetooth Comparison Work/Life Balance Gamification Wearable Technology Network upgrade Digital Alt Codes Mobility Batteries Firefox Superfish Customer Service Office Samsung Alerts USB Co-Managed IT Address Permissions Health Private Cloud RMM Motherboard Cables Managed Services Provider User Error Fraud Cost Management Budget Onboarding GDPR Patch Management Tech Support Policy Identity Continuity Webcam Law Enforcement Notifications Electronic Medical Records Images 101 Physical Security Error Emoji Regulation Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Cortana 3D Printing Supercomputer CrashOverride Motion Sickness Staffing Processors Taxes Printers Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS IT Consultant Computer Repair Relocation Cameras Mobile Data Recovery How To Tracking Mobile Computing Cleaning Financial Black Market Free Resource CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3