top of page

Mastercard's Multi-Year DNS Misconfiguration Exposed Critical Vulnerability


A recent discovery has unveiled that Mastercard operated with a critical Domain Name System (DNS) misconfiguration for nearly five years, potentially exposing the company to significant security risks. The error, identified by security researcher Philippe Caturegli, involved a typographical mistake in one of Mastercard's DNS server settings, where "akam.net" was incorrectly entered as "akam.ne".


The Oversight and Its Implications

From June 30, 2020, to January 14, 2025, this misconfiguration persisted unnoticed. The incorrect DNS entry could have allowed malicious actors to intercept or redirect internet traffic intended for Mastercard, posing risks such as:

  • Traffic Interception: Attackers could have hijacked data transmitted to Mastercard, leading to potential data breaches.

  • Phishing Opportunities: Cybercriminals might have created counterfeit sites mimicking Mastercard to deceive users.

  • Unauthorized Access: The flaw could have been exploited to obtain legitimate SSL/TLS certificates, enabling encrypted communication with unsuspecting users.

Caturegli, founder of security consultancy Seralys, proactively registered the "akam.ne" domain for $300 to prevent its misuse. Upon setting up a DNS server, he observed hundreds of thousands of daily requests, indicating the potential scale of exploitation.


Mastercard's Response

Upon notification, Mastercard promptly corrected the DNS entry. A spokesperson stated, "We have looked into the matter and there was not a risk to our systems." Despite this assurance, the incident underscores the importance of meticulous DNS configurations and regular audits to prevent such vulnerabilities.


Lessons for Cybersecurity Professionals

This incident serves as a critical reminder for cybersecurity experts and decision-makers to:

  • Conduct Regular Audits: Implement routine checks of DNS configurations to identify and rectify errors promptly.

  • Monitor Unused Domains: Keep track of and secure domains that could be exploited due to typographical errors.

  • Establish Incident Response Plans: Develop and maintain robust protocols to address potential misconfigurations swiftly.


By prioritizing these practices, organizations can mitigate risks associated with DNS misconfigurations and enhance their overall security posture.

 
 
 

Comments


bottom of page