[dns-operations] BGP Hijack of Amazon DNS

Andrew Sullivan ajs at anvilwalrusden.com
Sun Apr 29 19:21:39 UTC 2018


Well, Mirai looked pretty sophisticated for a WoW gaming attack, too, but 
that's what it turned out to be.  Maybe the villains watched too many James 
Bond movies and like pointless sophistication.

A

--
Please excuse my clumbsy thums
----------
On April 29, 2018 15:09:58 Viktor Dukhovni <ietf-dane at dukhovni.org> wrote:

> > On Apr 29, 2018, at 2:56 PM, Phillip Hallam-Baker <phill at hallambaker.com> 
> wrote:
> >
> > attackers tend to go for the least effort they have to expend
> > to succeed.  this attack is unusual in its seeming unneeded
> > sophistication.  this is why the 'this is a test run' theory
> > appeals to me.
> >
> > ​The did get away with $17 million in untraceable cryptocurrency...​
>
> It is good to have a plausible cover story.  It might even be true
> that this is just a heist or it might not.  And yet it sure looks
> sophisticated for a crypto currency heist.  Anyone have tin-foil
> hats for sale?
>
> --
>	Viktor.
>
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations






More information about the dns-operations mailing list