{"id":5763,"date":"2018-05-30T11:16:29","date_gmt":"2018-05-30T09:16:29","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5763"},"modified":"2022-06-25T17:08:36","modified_gmt":"2022-06-25T15:08:36","slug":"cloudflare-dns-service-1-1-1-1-hacked-from-china","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/05\/30\/cloudflare-dns-service-1-1-1-1-hacked-from-china\/","title":{"rendered":"CloudFlare DNS service 1.1.1.1 hacked from China &hellip; ?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/05\/30\/cloudflare-dns-service-1-1-1-1-von-china-gehackt\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A short note\/information for users, who use the DNS service of CloudFlare. The service was (possibly) hacked by China. Here is some information.<\/p>\n<p><!--more--><\/p>\n<h2>DNS service, what do I need it for?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/a5abc15767164fb68d9e91f3d8debdc6\" alt=\"\" width=\"1\" height=\"1\" \/>A DNS service is contacted for each action on the Internet (e.g. retrieving an Internet page in the browser). This DNS service converts URLs in the form www.borncity.com into an IP address. Only this IP address enables the browser, the e-mail client, etc. to contact the relevant servers on the Internet.<\/p>\n<p>The DNS service is the address book of the Internet, which provides the address (similar to street and city) of a name. If you control the DNS service, you can of course determine where Internet requests are redirected to.<\/p>\n<h2>There are various DNS services in use<\/h2>\n<p>As an ordinary user you don't really care about DNS services. The DSL routers, Windows systems and mobile devices are pre-configured so that a DNS server is known. Internet requests are resolved via this DNS server.<\/p>\n<p>In most cases, a DNS service of the provider is used. But whenever this DNS service is too slow, fails or cannot be used due to censorship, the some users will configure an alternative DNS service in the router or operating system. There is the Google DNS service under the IP address 8.8.8.8.<\/p>\n<h2>CloudFlare DNS service 1.1.1.1<\/h2>\n<p>But also CloudFlare offers a DNS service under the IP address 1.1.1.1 (see my blog post <a href=\"https:\/\/borncity.com\/win\/2018\/04\/01\/cloudflare-launches-dns-service-with-ip-1-1-1-1\/\">Cloudflare launches DNS Service with IP 1.1.1.1<\/a>). Arguments for the offer included speed and above all the provision of privacy. CloudFlare assured to delete the data within 24 hours to ensure privacy.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"CloudFlare DNS 1.1.1.1\" src=\"https:\/\/i.imgur.com\/xdOPirc.jpg\" alt=\"CloudFlare DNS 1.1.1.1\" width=\"289\" height=\"289\" \/>(Cloudflare DNS address)<\/p>\n<h2>DNS service hijacked?<\/h2>\n<p>I don't have a lot of information. Jake Williams (@MalwareJake) has posted the following tweet (now deleted, due to the fact, that it wasn't\u00a0Shanghai Telecom).<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">CloudFlare's new DNS service at 1.1.1.1 was hijacked by (drum roll please)<br \/>\n.<br \/>\n.<br \/>\n.<br \/>\n.<br \/>\nChina!<br \/>\nI wish I could say I'm surprised. I'm not. While this might be anecdotal bias, I'm not surprised that it's Shanghai Telecom either. <a href=\"https:\/\/t.co\/okPZdjITeh\">https:\/\/t.co\/okPZdjITeh<\/a><\/p>\n<p>\u2014 Jake Williams (@MalwareJake) 29. Mai 2018<\/p><\/blockquote>\n<p><span id=\"preserved5ae72d6f3a64c7c96c9d1cb040920c7\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>There was probably a BGP hijack of CloudFlare's DNS service 1.1.1.1.1. Here is the message:<\/p>\n<blockquote>\n<h5>Possible BGP hijack<\/h5>\n<p>Beginning at 2018-05-29 08:09:45 UTC, we detected a possible BGP hijack.<\/p>\n<p>Prefix 1.1.1.0\/24, is normally announced by AS13335 Cloudflare Inc.<\/p>\n<p>But beginning at 2018-05-29 08:09:45, the same prefix (1.1.1.0\/24) was also announced by ASN 58879.<\/p>\n<p>This was detected by 14 BGPMon peers.<\/p>\n<p>Expected<\/p>\n<p>Start time: 2018-05-29 08:09:45 UTC<\/p>\n<p>Expected prefix: 1.1.1.0\/24<\/p>\n<p>Expected ASN: 13335 (Cloudflare Inc)<\/p>\n<p>Event Details<\/p>\n<p>Detected advertisement: 1.1.1.0\/24<\/p>\n<p>Detected Origin ASN 58879 (Shanghai Anchang Network Security Technology Co.,Ltd.)<\/p>\n<p>Detected AS Path 32764 11017 6939 58879<\/p>\n<p>Detected by number of BGPMon peers: 14<\/p><\/blockquote>\n<p>The animation over the timeline (available via the buttons above the following graphic) of the page <a href=\"https:\/\/web.archive.org\/web\/20180714032540\/https:\/\/bgpstream.com\/event\/138295\" target=\"_blank\" rel=\"noopener\">bgpstream.com<\/a> shows how the DNS requests were redirected to another provider (probably a Chinese telecom provider) for a short time.<\/p>\n<p><img decoding=\"async\" title=\"CloudFlare DNS hijack\" src=\"https:\/\/i.imgur.com\/jq6T7fe.jpg\" alt=\"CloudFlare DNS hijack\" \/> CloudFlare DNS hijack<\/p>\n<p>The whole thing shows once again: The devil is often in the details. It's great that CloudFlare offers the DNS service to ensure more privacy. But if a Chinese provider succeeds in compromising the service, that's all puff pastry. At least such experiments are discovered. I don't know what's behind it. Maybe this was another Chinese test to prepare for certain cyber attacks in a crisis.<\/p>\n<p><strong>Similar articles:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/04\/01\/cloudflare-launches-dns-service-with-ip-1-1-1-1\/\">Cloudflare launches DNS Service with IP 1.1.1.1<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20210226181905\/https:\/\/borncity.com\/win\/2018\/06\/01\/cloudflare-1-1-1-1-dns-service-had-a-17-minutes-outage\/\" rel=\"bookmark\">Cloudflare 1.1.1.1 DNS service had a 17 minutes outage<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A short note\/information for users, who use the DNS service of CloudFlare. The service was (possibly) hacked by China. Here is some information.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-5763","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5763"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5763\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}