Wednesday, March 20, 2024

Preventing DNS Attacks: The Frax Finance Incident

Key learnings

A DNS assault resulted in the domains of Frax Finance being taken over on Wednesday, November 1. Fortunately, no customer cash were reported lost. Attacks against the domain name system (DNS) happen when bad actors attempt to take over domains and divert visitors from trustworthy websites to their own, harmful websites. In the realm of cryptocurrencies, DNS attacks are becoming increasingly problematic; occurrences similar to this one have happened more regularly in the previous year.




Earlier this week, on November 1, the domains of crypto lending platform Frax Finance were hijacked, with attackers attempting to seize control and redirect traffic to malicious domains. Fortunately, the project team was able to promptly regain control of these domains, and there were no reported incidents of user funds being compromised.

Zooming out from this incident, attacks like these – known as “DNS attacks” – are becoming a rising threat in the world of cryptocurrencies. Given the industry’s digitized nature and flow of capital, hackers have a lot to gain from exploiting security vulnerabilities. To help ensure the safety of funds, it remains imperative to educate users and project developers on the latest scam methods and risk control measures.

In this article, we provide an overview of the recent Frax Finance attack and what can be learned from this incident, diving deeper into the background of DNS attacks and how to prevent them.

What Is a DNS Server?

First, let’s explore how a domain name system (DNS) server works. DNS servers are one of the fundamental tools that allow people to browse the internet with ease. DNS servers translate domain names into the numeric Internet Protocol (IP) addresses that represent their location on the internet.

Whenever someone types a domain into their web browser, such as “www.binance.com,” their device sends a query to a DNS server asking for the IP address. Typically, this query will go through multiple DNS servers until it finds the corresponding address.

One can think of the internet as a massive, intricate highway system, with each road leading to a different website. On these roads, DNS servers function as traffic officers, guiding cars in the right direction. Navigating the internet without DNS servers would be like driving in a foreign country with no maps, GPS, or street signs — everyone would end up at the wrong destination.

DNS Attacks

DNS servers are built on trust. We trust that the system will bring us to the right website. As such, we enter sensitive material on these websites, including login credentials, personal information, or even bank account details. Now, what if an attacker were to compromise these servers for malicious purposes?

A DNS attack occurs when a malicious actor tries to redirect you from a legitimate website you want to visit to a fake website they control. Similar to our highway metaphor above, it’s like if someone changed the road signs, so instead of getting you to your home, they led you to a robber’s house.

DNS attacks can be conducted in a variety of ways using different methods and techniques, usually to disrupt services or steal sensitive information. Two of the most common techniques in DNS attacks include cache poisoning and domain hijacking. In the former case, attackers provide false information to a DNS server to redirect traffic away from a legitimate website to a malicious website they control. In the latter case, attackers gain control of the domain itself without the legitimate owner’s permission.

The Frax Finance incident

In the case of the recent Frax Finance attack, hackers attempted to seize control of the “frax.com” and “frax.finance” domains. Once they detected the attack, the project team reacted quickly to inform its community on X (formerly Twitter), advising users not to interact with the compromised domains. 

Additionally, they were able to contact their DNS provider (Name.com), who promptly regained control of the domains and routed them back to their proper nameservers and configurations. Though the root cause of the incident is still under investigation, no loss of user funds was reported.

SSL Certificate Mismatch

A Secure Sockets Layer (SSL) certificate is like a digital passport for websites and is essential for cybersecurity. Just like a passport confirms your identity when you travel, an SSL certificate confirms the identity of a website to your computer. SSL certificates also ensure that information being sent between a computer and a website is encrypted so that no one else can read it. This is particularly important when dealing with sensitive information, such as login credentials.

When a DNS server is compromised, it will try redirecting users to a different website. An SSL certificate mismatch would then occur, effectively alerting the user that something is wrong. Let’s illustrate this with an example.

Case in point

Assume there is an original domain named “binancedefiapp.com” that is hosted on a server with an IP address of 192.168.0.1. Suppose the DNS server is compromised. A malicious actor changes the DNS entries so that “binancedefiapp.com” is now hosted at the IP address 192.168.2.2, where the attacker has set up their own malicious version of the website. Yet, they still require an SSL certificate to make their website seem secure. 

A primary red flag should be raised if the connection is not secure and it returns a plain Hypertext Transfer Protocol (HTTP) address rather than encrypted Hypertext Transfer Protocol Secure (HTTPS) traffic, which is usually recognizable with a green lock in the address bar of the browser interface (or a similar icon). 

The attacker is still unable to set the SSL certificate for “binancedefiapp.com,” since a single DNS server is compromised. To generate a valid certificate for a certain domain, they still need to prove ownership of that domain to a third-party issuer, which won’t be possible as the attacker owns just one DNS server. In this case, even if there is a certificate, it will not match the hostname, as the attacker would have to stay with a certificate issued for another domain. When visiting such a website, the user’s browser recognizes if the certificate is issued for the visited domain or not. In the case of a mismatch, it throws up the following error:

If something like this pops up, users should not proceed to that website.

Internal and External DNS Servers

There are multiple DNS servers on the internet, so it is not possible to poison all of them. Internal DNS servers, for example, those residing within a closed internal environment (a company’s corporate network or custom DNS server), may be targeted more easily than public DNS servers, such as open Google resolvers.

While there could be some chance of poisoning Google DNS servers, the probability of this occurring is generally quite low. Even if it does happen, a rapid response and alert are more likely to appear. Compare this to standalone or custom DNS servers, which are usually less monitored and less secure. Generally, it is recommended to resolve IPs using Google’s public DNS resolvers or other reliable, publicly available providers.

How to Stay Safe From DNS Attacks

Generally, there are two main types of DNS-related security risks: end-user devices and DNS servers being compromised by hackers. Prevention tips vary for each type.

End-user device being compromised

This security risk arises when end-user devices are controlled or infected, resulting in DNS cache poisoning or domain hijacking. Preventive measures for end-users include the following:

  • Avoid clicking suspicious links and installing software or browser plugins from unidentified sources.

  • Avoid using public WiFi networks with uncertain security credentials.

  • Periodically clear your DNS cache.

  • Conduct regular scans for malicious software on your devices.

Unfortunately, most things happen on the client or end-user side, and there are basically no definitive means of disposal for project developers. The project side usually has no idea whether their client’s DNS has been contaminated. Apart from setting up subsequent customer complaint channels, the project side can proactively educate clients about such threats. 

DNS server being compromised

In this scenario, hackers exploit security vulnerabilities or employ social engineering tactics to gain control over DNS servers, often leading to alterations in domain records. Preventive measures for end users include the following:

  • When accessing websites, ensure the domain name is spelled correctly. 

  • Verify that the site uses the HTTPS protocol without any browser security warnings.

  • Before conducting sensitive operations (e.g., entering passwords or mnemonic phrases), reconfirm the website’s certificate for validity.  

  • Utilize browser security extensions offered by reputable security firms. These extensions detect website anomalies and provide warnings when users make infinite approvals or transfers to high-risk wallets.

Measures for the project developer side include the following:

  • Opt for reliable domain providers with strong reputations, and employ dedicated personnel to monitor and address domain anomaly alerts promptly.

  • Implement automated monitoring systems to swiftly detect anomalies or malicious scripts and elements in pages on the domain’s DNS resolution results.

Understanding and addressing the potential vulnerabilities in DNS management is imperative. By adopting the recommended measures, both users and project teams can fortify their defenses against DNS-related security challenges.

Protect Your Servers

DNS attacks are a harsh reality in an emerging industry like crypto and have been a growing concern in the cryptocurrency space as of late. The damage they have the potential to cause can be devastating, leaving user funds vulnerable. 

Last year, Curve Finance experienced a DNS attack resulting in over $570K in ETH being stolen from user wallets, though the Binance Investigations team was able to help recover the majority of the stolen funds. More recently, we saw major DNS attacks on the Balancer and Galxe protocols occurring in September and October, respectively.

For the cryptocurrency industry to grow sustainably, we must prioritize building a secure ecosystem. We hope both project developers and users alike can learn from this article and understand the importance of safeguarding against DNS attacks. Together, we can build a safer ecosystem for the future of crypto.

Further Reading

Wednesday, November 1, 2023

Factory Reset Protection (FRP)

 Factory Reset Protection (FRP) is a security feature that prevents unauthorized access to your Android device after a factory reset. It is also known as Google account verification¹.


FRP was introduced in Android 5.0 Lollipop in 2014 as a response to the increasing problem of smartphone theft and data breach. Before FRP, anyone who had access to your device could easily erase your data and settings and use it as their own. After FRP, you need to enter the Google account and password that you used to set up your device before you can use it again¹.


The concept of FRP is to link your device to your Google account, so that if your device is lost or stolen, the person who has it cannot easily wipe out your data and settings. This way, FRP protects your personal and private information on your device from being accessed by others without your permission. It also makes your device less attractive to thieves, as they cannot use it or sell it as easily¹.


The purpose of FRP is to provide a better security and privacy for your device and data. FRP can reduce the risk of identity theft and fraud, as well as enhance your peace of mind and confidence in using your device¹.


The positive effects of FRP on users are:


- Increased security and privacy of your data and device

- Reduced risk of identity theft and fraud

- Enhanced peace of mind and confidence in using your device


The negative effects of FRP on users are:


- Potential inconvenience and frustration if you forget your Google account or password

- Difficulty in transferring or selling your device to others

- Possibility of being locked out of your device if you reset it without removing FRP first


The ethics of FRP is a matter of debate, as different users may have different opinions and preferences regarding the use of FRP. Some ethical questions that may arise are:


- Is it fair to impose FRP on users without giving them an option to disable it?

- Is it responsible to use FRP without informing users about its implications and limitations?

- Is it justified to use FRP without providing users with adequate support and guidance?

- Is it acceptable to use FRP without respecting users' rights and choices?

- Is it appropriate to use FRP without considering its social and environmental impacts?


There is no definitive answer to these questions, as different users may have different values, interests, and expectations regarding the use of FRP. Therefore, it is important to adopt a balanced and informed approach that considers both the benefits and harms of FRP, as well as the rights and duties of all parties involved². Such an approach should involve:


- Understanding the purpose and function of FRP

- Evaluating the pros and cons of using FRP

- Developing personal preferences and policies for using FRP

- Implementing best practices and tips for using FRP

- Seeking help and advice when needed


Here are some examples to further elaborate on FRP:


- Suppose you bought a new Android phone and set it up with your Google account. You enabled the screen lock and added some apps, contacts, photos, and other data on your phone. One day, you accidentally dropped your phone in a puddle and it stopped working. You decided to buy another Android phone and transfer your data from the old one. However, when you tried to turn on the old phone, it asked you for your Google account and password. You realized that you forgot them, as you had not used them for a long time. You tried to recover them online, but you could not remember the answers to the security questions or the recovery email. You were stuck with a locked phone that you could not access or reset. This is an example of a negative effect of FRP on users.

- Suppose you sold your old Android phone to someone online. You did not bother to factory reset it before shipping it, as you thought it was not necessary. You just removed your SIM card and SD card from the phone. The buyer received the phone and tried to set it up with their own Google account. However, they could not do so, as the phone asked them for your Google account and password. They contacted you and asked you for them, but you refused to give them, as you did not trust them with your personal information. They accused you of scamming them and demanded a refund. You argued that it was their fault for not checking the phone before buying it. You ended up in a dispute that could not be resolved easily. This is an example of a negative effect of FRP on users.

- Suppose you lost your Android phone while traveling abroad. You were worried that someone might find it and access your data or use it for malicious purposes. You tried to locate it using Google's Find My Device service, but you could not find it online. You decided to erase it remotely using the same service, hoping that it would wipe out all your data and settings from the phone. However, you were relieved to know that even if the phone was erased, it would still ask for your Google account and password before anyone could use it. You were confident that your data and device were safe and secure, thanks to FRP. You also reported the loss to your carrier and asked them to block the phone's IMEI number, making it unusable on any network. This is an example of a positive effect of FRP on users.


I hope this information helps you understand what FRP is, before and after it was introduced and implemented, its concept, purpose, effects, and ethics. If you have any other questions, feel free to ask me. 😊


Sources:

(1) Factory Reset Protection: What you need to know. https://www.androidcentral.com/factory-reset-protection-what-you-need-know.

(2) Protection History - Microsoft Support. https://support.microsoft.com/en-us/windows/protection-history-f1e5fd95-09b4-46d1-b8c7-1059a1e09708.

(3) Prevent others from using your device without permission. https://support.google.com/android/answer/9459346?hl=en-GB.

(4) Help prevent others from using your device without permission. https://support.google.com/android/answer/9459346?hl=en.

(5) How to Disable Factory Reset Protection (FRP) on Android - iSumsoft. https://www.isumsoft.com/android/how-to-disable-factory-reset-protection-on-android.html.

Wednesday, September 13, 2023

Unlocking the Power of Orbic Joy 4G: A Comprehensive Guide to Activation



Introduction:

The Orbic Joy 4G is a versatile and user-friendly smartphone that offers a range of features to enhance your mobile experience. From its affordable price point to its impressive performance, activating your Orbic Joy 4G is the first step towards discovering its full potential. In this blog post, we will guide you through the activation process, ensuring that you can enjoy all the benefits this device has to offer.


Step 1: Gathering Requirements

Before diving into the activation process, ensure you have the necessary items at hand. These typically include the Orbic Joy 4G smartphone, a compatible SIM card, a stable internet connection, and any relevant activation codes or credentials provided by your carrier.


Step 2: Inserting the SIM Card

Locate the SIM card slot on your Orbic Joy 4G smartphone. Most devices have the slot on the side or back panel. Gently insert your SIM card into the designated slot, ensuring the gold contacts are facing downward. Once inserted, secure the SIM card tray back into the device.


Step 3: Powering on and Connecting to Wi-Fi

Press and hold the power button on your Orbic Joy 4G until the device powers on. Follow the on-screen instructions to select your language, time zone, and other basic settings. Once prompted, connect your smartphone to an available Wi-Fi network to ensure a stable internet connection.


Step 4: Activating with Carrier

Now it's time to activate your Orbic Joy 4G with your carrier. This process can vary depending on your service provider, but generally, there are two methods: through a carrier app or by manual activation. If your carrier provides a dedicated app for activation, download and launch it from the Google Play Store. Follow the on-screen instructions, inputting any necessary codes or credentials as prompted.


Alternatively, you can manually activate your device by contacting your carrier's customer support or visiting their website. Provide them with the necessary information such as your device's IMEI number, SIM card details, and account information. They will guide you through the activation process and ensure your Orbic Joy 4G is connected to their network.


Step 5: Setting Up Your Orbic Joy 4G

Once your device is activated, follow the on-screen instructions to complete the setup process. This typically includes signing in with your Google account, customizing your preferences, and selecting apps to install. Take your time to explore the various settings, personalize your device, and download essential apps that suit your needs.


Conclusion:

Activating your Orbic Joy 4G opens up a world of possibilities and convenience. By simply following the steps outlined in this guide, you can ensure a seamless and hassle-free activation process. Remember to consult your carrier's instructions or customer support if you encounter any issues along the way. Now that your Orbic Joy 4G is activated, enjoy the freedom and functionality that this device brings to your fingertips!

Sunday, September 3, 2023

How to Make $300 daily with Bitcoin

 Do you want to earn $300 EVERY DAY?

You have all heard about Bitcoin and Ethereum cryptocurrencies.
I want to show you a new way to achieve this profit!

FIRST INCOME AFTER 10 MINUTES!
Step-by-step system:
1) First of all you need Bitcoin and Ethereum wallets. I prefer to use http://blockchain.com because you will have both wallets in the same account, but you can use the wallets you like.

Link for registration: https://login.blockchain.com/#/signup.


2) You need to have at minimum 0.0015 BTC (~ about $13) at your wallet.


3) Then you need to exchange Bitcoin to Ethereum using exchanger https://365crypto.biz on course 0.0015 BTC - 0.105 ETH

Attention! Don't try to exchange less than 0.0015 BTC because the minimum to exchange here is 0.0015 BTC. If you send less than the minimum, you will only receive the refund of your BTC!

How to exchange here:

Fill the form and click "Exchange".
You will see the BTC address of exchanger where you should send specified amount of BTC from your wallet (don't forget about commission for transaction in BTC network)
You will receive the Ethereum after the 1st confirmation on BTC network; it takes about 10 minutes

4) Now you need to exchange Ethereum to Bitcoin using the exchanger https://changelly.com.
Right now, 0.105 ETH - 0.0025 BTC


5) So you earned 0.001 BTC (more than $9) profit per one cycle of exchanges!


6)If you start with a larger amount of BTC, profit will be higher in each cycle.



The above exchanger's links are my referral's link. Exchangers have referral programs, and I get a small % from each transaction if you do it using my links. You can do the exchanges without using my link, but it will help me as gratitude for unveiling this secret!

This is my Blockchain wallet:

Exchanges rates can change every day, so earn now that you can!

If you have any questions, you can send me an email to gcodefire@gmail.com

Friday, September 1, 2023

Machine Learning

 Machine learning is a type of artificial intelligence (AI) that allows computers to learn without being explicitly programmed. This is done by feeding the computer with data and allowing it to find patterns and relationships in the data. Once the computer has learned these patterns, it can use them to make predictions or decisions about new data.

Machine learning has a wide range of uses, both for humans and the earth. Some of its most common uses include:

  • Predictive analytics: Machine learning can be used to predict future events, such as customer behavior, product demand, or financial market trends. This information can be used to make better decisions about business planning, marketing, and investment.
  • Fraud detection: Machine learning can be used to identify fraudulent transactions, such as credit card fraud or insurance fraud. This can help to protect businesses and individuals from financial losses.
  • Medical diagnosis: Machine learning can be used to diagnose diseases by analyzing medical images, such as X-rays or MRI scans. This can help doctors to make more accurate diagnoses and improve patient care.
  • Self-driving cars: Machine learning is essential for the development of self-driving cars. These cars use machine learning to identify objects and obstacles in their environment, and to make decisions about how to navigate safely.
  • Environmental monitoring: Machine learning can be used to monitor environmental conditions, such as air quality or water quality. This information can be used to track changes in the environment and to identify potential problems.

Machine learning has many benefits, but it also has some drawbacks. Some of the potential drawbacks of machine learning include:

  • Bias: Machine learning models can be biased if they are trained on data that is biased. This can lead to inaccurate predictions or decisions.
  • Privacy: Machine learning models often require a lot of data to train. This data can be personal or sensitive, and it is important to protect the privacy of individuals.
  • Explainability: It can be difficult to explain how machine learning models make decisions. This can make it difficult to trust these models and to use them in critical applications.

Overall, machine learning is a powerful tool that can be used to solve a wide range of problems. However, it is important to be aware of the potential drawbacks of machine learning before using it.

Here are some specific examples of how machine learning is being used to benefit humans and the earth:

  • Healthcare: Machine learning is being used to develop new drugs and treatments, to diagnose diseases more accurately, and to personalize healthcare for each individual patient.
  • Agriculture: Machine learning is being used to improve crop yields, to predict crop prices, and to detect pests and diseases.
  • Finance: Machine learning is being used to detect fraud, to manage risk, and to make investment decisions.
  • Transportation: Machine learning is being used to develop self-driving cars, to optimize traffic flow, and to improve public transportation.
  • Environment: Machine learning is being used to monitor environmental conditions, to predict climate change, and to develop renewable energy sources.

Machine learning is a rapidly growing field, and it is likely to have a profound impact on our lives in the years to come. It is important to be aware of the potential benefits and drawbacks of machine learning so that we can use it responsibly and ethically.

How to Unlock Bootloader on Android

The bootloader is a program that is responsible for loading the operating system when your Android phone boots up. It is a critical part of the security system on your phone, and it is usually locked by the manufacturer.

Unlocking the bootloader allows you to install custom ROMs, kernels, and other mods on your phone. However, it also makes your phone more vulnerable to security attacks.

Before you unlock the bootloader, you should:

  • Make a backup of your data.
  • Understand the risks involved.
  • Check if your phone is supported by the bootloader unlocking process.

To unlock the bootloader, you will need:

  • A computer with a USB connection.
  • The latest Android SDK Platform Tools.
  • The fastboot command-line tool.

The steps to unlock the bootloader are as follows:

  1. Enable USB debugging on your phone.
  2. Connect your phone to your computer using a USB cable.
  3. Open a command prompt window on your computer.
  4. Navigate to the directory where you have downloaded the Android SDK Platform Tools.
  5. Type the following command and press Enter:
fastboot oem unlock

This will unlock the bootloader on your phone.

Once the bootloader is unlocked, you will need to reboot your phone.

Here are some things to keep in mind when unlocking the bootloader:

  • The bootloader unlocking process may vary depending on the specific model of your Android phone.
  • If you are having trouble unlocking the bootloader, you can try searching for a tutorial on YouTube or another online forum.
  • There are also a number of bootloader unlocking services available online, but be sure to choose one that is reputable.

Unlocking the bootloader can be a risky process, but it can also give you more control over your Android phone. If you are considering unlocking the bootloader, be sure to do your research and understand the risks involved.

Here are some of the benefits of unlocking the bootloader:

  • You can install custom ROMs, which are modified versions of the Android operating system.
  • You can install custom kernels, which can improve the performance or battery life of your phone.
  • You can root your phone, which gives you more control over the system.
  • You can install mods, which are small changes to the system that can add new features or improve the existing ones.

However, there are also some risks associated with unlocking the bootloader:

  • Your phone may become less secure.
  • You may void your warranty.
  • Some apps may not work properly after the bootloader is unlocked.

It is important to weigh the benefits and risks before deciding whether or not to unlock the bootloader on your Android phone.

How to Remove FRP on Tecno Spark 8 Android 11

 

FRP, or Factory Reset Protection, is a security feature on Android devices that prevents unauthorized users from accessing the device after it has been reset. If you have forgotten the Google account that was signed in to your Tecno Spark 8 Android 11, you will need to remove FRP in order to use the device.

There are a few ways to remove FRP on Tecno Spark 8 Android 11. One way is to use a Google account bypass tool. There are a number of these tools available online, but be sure to choose one that is compatible with your device.

Another way to remove FRP on Tecno Spark 8 Android 11 is to use the fastboot mode. To do this, follow these steps:

  1. Turn off your Tecno Spark 8.
  2. Hold down the Volume Down button and the Power button at the same time.
  3. When the phone powers on, release the Power button but keep holding down the Volume Down button.
  4. You will see the Fastboot mode screen.
  5. Connect your Tecno Spark 8 to your computer using a USB cable.
  6. Open a command prompt window on your computer.
  7. Type the following command and press Enter:
fastboot oem unlock

This will unlock the bootloader on your Tecno Spark 8. Once the bootloader is unlocked, you can then remove FRP using a Google account bypass tool.

Here are some additional tips for removing FRP on Tecno Spark 8 Android 11:

  • Always make a backup of your data before removing FRP.
  • Do not interrupt the FRP removal process.
  • If you are not sure what you are doing, it is best to consult a professional.

I hope this blog post has been helpful. If you have any questions, please leave a comment below.

Here are some other things to keep in mind when removing FRP on Tecno Spark 8 Android 11:

  • The FRP removal process may vary depending on the specific model of your Tecno Spark 8.
  • If you are having trouble removing FRP, you can try searching for a tutorial on YouTube or another online forum.
  • There are also a number of FRP removal services available online, but be sure to choose one that is reputable.