“The transition to internet protocol version 6 has opened up a whole new range of threat vectors that allow attackers to set up undetectable communications channels across networks, researchers have found.”
Slashdot reader Bismillah summarizes a report from IT News.
Researchers at NATO’s Cooperative Cyber Defence Centre of Excellence and Estonia’s University of Tallinn have worked out how to set up communications channels using IPv6 transition mechanisms, to exfiltrate data and for systems control over IPv4-only and dual-stack networks — without being spotted by network intrusion detection systems.
The article argues that “Since IPv6 implementations and security solutions are relatively new and untested, and systems engineers aren’t fully aware of them, the new protocol can become a network backdoor attackers can exploit undetected.” The researchers’ paper is titled “Hedgehog In The Fog.”
Read more of this story at Slashdot.
https://slashdot.org/slashdot-it.pl?op=discuss&id=10466629&smallembed=1