[ °ø Áö ] DNS ÇÏÀÌÀçÅ·(Hijacking) °ø°Ý ¹ß»ý ÁÖÀÇ ±Ç°í 2019-01-25

¾È³çÇϽʴϱî. È£½ºÆ®¸ÕÆ®ÀÔ´Ï´Ù.

¸ÕÀú È£½ºÆ®¸ÕÆ®¸¦ ¾Æ²¸ÁÖ½Ã°í »ç¶ûÇØ Áֽô °í°´ ¿©·¯ºÐ²²  Áø½ÉÀ¸·Î °¨»çµå¸®¸ç

DNS ÇÏÀÌÀçÅ·(Hijacking) °ø°Ý ¹ß»ý ÁÖÀÇ ±Ç°í°¡ ÀÖ¾î À̸¦ ¾Ë·Áµå¸®°íÀÚ ÇÕ´Ï´Ù.

---------------------------------------------------------------------------

¡à °³¿ä
o Ú¸ ±¹Åä¾Èº¸ºÎ(DHS)´Â µµ¸ÞÀγ×ÀӽýºÅÛ(DNS)À» ³ë¸° ÇÏÀÌÀçÅ· °ø°Ý ¹ß»ýÀ» °æ°í
  * DNS ÇÏÀÌÀçÅ· : DNS ¼­¹ö¸¦ °ø°ÝÇØ ƯÁ¤ µµ¸ÞÀο¡ ¿¬°áµÇ´Â IP ÁÖ¼Ò¸¦ ´Ù¸¥ ÁÖ¼Ò·Î º¯°æÇÏ´Â °ø°Ý¹æ¹ý
o DNS ¿î¿µ ´ã´çÀÚµéÀº DNS ÇÏÀÌÀçÅ· °ø°Ý ¹ß»ý¿¡ ´ëºñ, ¾Æ·¡ º¸¾ÈÁ¶Ä¡ ¹æ¹ý¿¡ µû¶ó Á¶Ä¡ÇÒ °ÍÀ» ±Ç°í


¡à ÁÖ¿ä ³»¿ë
o Ú¸ ±¹Åä¾Èº¸ºÎ »êÇÏ ±¹°¡»çÀ̹öº¸¾ÈÅë½ÅÅëÇÕ¼¾ÅÍ(NCCIC)´Â ÃÖ±Ù ´ë±Ô¸ð DNS ÇÏÀÌÀçÅ· ½Ãµµ¸¦ ¹ß°ßÇÏ¿© °øÁö
o °ø°ÝÀÚ´Â DNS Á¤º¸¸¦ º¯Á¶ÇÑ µÚ »ç¿ëÀÚ Æ®·¡ÇÈÀ» ¿ìȸ½ÃÄÑ °¡·Îä°Å³ª À§Á¶µÈ »çÀÌÆ®·Î ¿¬°á½Ãų ¼ö ÀÖÀ½


¡à º¸¾ÈÁ¶Ä¡ ¹æ¹ý
o µµ¸ÞÀÎ µî·ÏÁ¤º¸ °ü¸® °èÁ¤ ¹× DNS ¼­¹ö °ü¸®ÀÚ °èÁ¤ µî Áß¿ä °èÁ¤ÀÇ °ü¸® °­È­
  - ·Î±×ÀÎ ÀÌ·Â Á¡°Ë µîÀ» ÅëÇØ ºñÁ¤»óÀû ·Î±×ÀÎ ½Ãµµ³ª ºñ¹Ð¹øÈ£ À¯Ãâ Á¤È²ÀÌ ÀÖÀ» °æ¿ì Áï½Ã ºñ¹Ð¹øÈ£ º¯°æ
o µµ¸ÞÀÎ µî·ÏÁ¤º¸ ¹× DNS ·¹ÄÚµå Á¤º¸¸¦ ÁÖ±âÀûÀ¸·Î È®ÀÎÇÏ¿© ÀÌ»óÀ¯¹« È®ÀÎ


¡à ±âŸ ¹®ÀÇ»çÇ×
o Çѱ¹ÀÎÅͳÝÁøÈï¿ø ÀÎÅͳÝÄ§ÇØ´ëÀÀ¼¾ÅÍ: ±¹¹ø¾øÀÌ 118


[Âü°í»çÀÌÆ®]
[1] https://www.us-cert.gov/ncas/current-activity/2019/01/24/CISA-Releases-Blog-Emergency-Directive
[2] https://www.us-cert.gov/ncas/current-activity/2019/01/10/DNS-Infrastructure-Hijacking-Campaign
[3] https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html
[4] https://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.html


---------------------------------------------------------------------------

                    Áñ°Å¿òÀÌ Àִ ȣ½ºÆÃ ¼­ºñ½º  [ È£½ºÆ®¸ÕÆ® ]