
Underminr exploits a vulnerability in shared CDN infrastructure to hide connections to malicious domains. The technique is a variant of domain fronting that uses SNI and TLS certificate validation fields to present an allowed domain while embedding a different target domain in the encrypted HTTP host header. CDN internal routing based on host headers sends the request to the hidden destination, making traffic appear to go to a reputable front domain. Underminr instead presents SNI and HTTP Host of one domain while forcing the request to the IP address of another tenant on the same shared edge. This mismatch has been used against large hosting providers, including those with domain-fronting mitigations, to reach command-and-control servers, VPN and proxy connections, and to bypass network egress policies.
"Underminr presents the SNI and HTTP Host of a domain while forcing a request to the IP address of another tenant on the same shared edge. The mismatch, ADAMnetworks reports, has been exploited in attacks targeting large-scale hosting providers, including those that have implemented mitigations against domain fronting. "This abuse permits connections that appear to go to a trusted domain to actually connect to another domain that could be used for malicious intent," the web security firm explains."
"Because CDNs routed requests internally based on the host headers, the request reached the hidden destination, while traffic would appear to be going to a reputable front domain. Instead of using a front domain, Underminr presents the SNI and HTTP Host of a domain while forcing a request to the IP address of another tenant on the same shared edge. The mismatch has been exploited in attacks targeting large-scale hosting providers, including those that have implemented mitigations against domain fronting."
"Threat actors can abuse Underminr to hide connections to command-and-control (C&C) servers, as well as VPN and proxy connections, and to circumvent network egress policies. "In the simple form, the detection gap appears when DNS decisions, edge IPs, SNI, Host headers, and CDN tenant routing are not correlated. The endpoint sees an allowed DNS lookup while the connection can complete against a different hosted name," ADAMnetworks says."
"According to the company, the attack technique has been abused in attacks to connect to domains hosted on CDN infrastructure shared with allowed domains, mostly via TCP connections on port 443, in which SNI exposes the intended TLS hostname. The Underminr vulnerability can be exploited using four different strategies to circumve"
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]