[dns-operations] BGP Hijack of Amazon DNS
Andrew Sullivan
ajs at anvilwalrusden.com
Sun Apr 29 19:21:39 UTC 2018
Well, Mirai looked pretty sophisticated for a WoW gaming attack, too, but
that's what it turned out to be. Maybe the villains watched too many James
Bond movies and like pointless sophistication.
A
--
Please excuse my clumbsy thums
----------
On April 29, 2018 15:09:58 Viktor Dukhovni <ietf-dane at dukhovni.org> wrote:
> > On Apr 29, 2018, at 2:56 PM, Phillip Hallam-Baker <phill at hallambaker.com>
> wrote:
> >
> > attackers tend to go for the least effort they have to expend
> > to succeed. this attack is unusual in its seeming unneeded
> > sophistication. this is why the 'this is a test run' theory
> > appeals to me.
> >
> > The did get away with $17 million in untraceable cryptocurrency...
>
> It is good to have a plausible cover story. It might even be true
> that this is just a heist or it might not. And yet it sure looks
> sophisticated for a crypto currency heist. Anyone have tin-foil
> hats for sale?
>
> --
> Viktor.
>
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
More information about the dns-operations
mailing list