The DHS Cybersecurity and Infrastructure Security Agency (CISA) is issuing an emergency directive on DNS infrastructure tampering.
"Using the following techniques, attackers have redirected and intercepted web and mail traffic, and could do so for other networked services."
Here is what CISA has seen in multiple incidents:
CISA also lists a series of cybersecurity actions to take to protect your organization or agency, including auditing your DNS records, changing DNS account passwords, adding multi-factor authentication to DNS accounts, and monitoring certificate transparency logs.
Read the CISA Emergency Directive on DNS Infrastructure Tampering for more details on near-term actions to mitigate risks from undiscovered tampering.
Government agencies given 10 days to comply with directive
With government agencies given just 10 days to implement these risk remediation measures, Congressman Jim Langevin tweeted about how that is supposed to happen during a government shutdown: