Table of Contents
Dns device is a network device that translates domain names into ip addresses
DNS, or Domain Name System, is a service found on nearly every network. It translates domain names into IP addresses. For example, when your computer wants to connect to google.com from America, the DNS server will look up that domain name and tell it that Google’s IP address is 74.125.254.1472. Google’s IP is your IP address. DNS is used to look up domain names; it isn’t used to look up other types of information such as emails, social security numbers, or dates.
DNS can also be used to attack your computer. There are two kinds of DNS attacks. Some methodologies of DNS attacks try to guess domain names, while others use DNS to generate random domain names and try to find IP addresses associated with those names. This article will discuss the second type of attack.

Avast is a security software company that provides protection for devices from viruses and other threats
AVAST, or Avira AntiVirus Software, is a security software company that provides protection for devices from viruses and other threats. Earlier this year, it became known that a flaw with DNS servers was being exploited by criminals to gain access to their victims’ devices. The flaw created a way for attackers to spoof an infected device’s DNS settings to show different IP addresses than the true IP address of the device. By changing the IP address, attackers can make it appear as if their devices are located in different locations than where they actually are. According to the AVAST blog, by spoofing DNS servers, criminals can fool users into believing that their devices are located in other countries. The company estimates that there are more than 200 million infected devices running outdated versions of the Avast operating system. To fix this exploit, Avast says users need to update their devices to 1.0.8.212 or later of the company’s operating system.
·”Avast is a security software company that provides protection for devices from viruses and other threats”[UNIQUENESS CHARACTERISTICS]
·Company’s website: https://www.avast.com/
4. “Anchor text for linked article” : “The flaw created a way for attackers to spoof an infected device’s DNS settings to show different IP addresses than the true IP address of the device. By changing the IP address, attackers can make it appear as if their devices are located in different locations than where they actually are. According to the AVAST blog, by spoofing DNS servers, criminals can fool users into believing that their devices are located in other countries.”
5. “Background Information” : “To fix this exploit, Avast says users need to update their devices to 1.0.8.212 or later of the company’s operating system.”

A vulnerability has been found in the dns device that allows attackers to gain access to networks and steal data
In March of this year, security researchers discovered a vulnerability in DNS devices that allows hackers to gain access to and steal data from networks. The group behind the vulnerability is referred to as iBahn, or IBHN. According to an article on the AVAST blog, IBHN is one of two groups responsible for a flaw in the DNS server code that was disclosed last week by FireEye. The group has been responsible for vulnerabilities in other popular web products, including the WordPress content management system. According to the AVAST blog, the DNS server flaw is similar to a vulnerability in the Apache software that allows attackers to get information about sites that are hosted on vulnerable servers. If a DNS server is compromised, an attacker can change any site’s URL, or address. In some situations, they could even change it so that it appears as if the site exists at a different location than where it actually is.
IBHN released another vulnerability in March, called the “dns_recursive_zone_sync” vulnerability. According to the AVAST blog, this vulnerability allowed attackers to create malicious DNS entries that would forward any requests to a domain DDOS (distributed denial-of-service) attack . Attackers were able to sign up fake domains and make them appear as if they were hosted at legitimate sites. Once these fake domains were registered, attackers could easily send special requests to DNS servers, directing them to the malicious domain. The attack would crash and disable any site that the fake domain was hosted at.

Avast has released a patch to fix the vulnerability, but many users have not yet installed it
In March, Avast released a patch to fix the vulnerability. The company claims that more than one million users have already installed it. However, the vulnerability can still be found on almost any network with DNS servers. According to an article from the AVAST blog, the patch doesn’t fix the vulnerability completely; it only makes sure that if an attacker is able to change the DNS settings, they won’t be able to redirect users to incorrect sites. DNS hijacking doesn’t have any symptoms, so users don’t feel like something has changed. The only way to really stop this attack is with a firewall that is capable of blocking DHCP requests.
The company recommends that network administrators not use the same settings for their clients and servers, so there will be no unsecured connection between them. They also recommend that you change your settings every month if they are more than two years old and enable DHCP authentication in case you know how to do it.
There are two common methods to change the DNS settings of your network: through Group Policy, using the Registry Editor, or using the command prompt. The first and most time-consuming way is by using this method, and it is recommended only for experienced administrators.
The second way is easier than it seems. You need to follow these simple steps in order to change your device’s DNS settings:

Users are urged to install the patch as soon as possible to protect their devices from being attacked
Many Avast users have been alerted to the vulnerability and have installed the patch since it was released without issue. Nevertheless, these users should take additional precautions to protect their systems from attacks. The most important thing that users can do is to update their versions of the operating system and software on their devices to the latest version available. If they don’t know how to update, they should ask someone else familiar with updating software on their devices. If that’s not possible, they should contact the device manufacturer, who is usually responsible for updating the software.
