[dns-operations] BGP Hijack of Amazon DNS
Phillip Hallam-Baker
phill at hallambaker.com
Sun Apr 29 20:32:45 UTC 2018
On Sun, Apr 29, 2018 at 3:07 PM, Viktor Dukhovni <ietf-dane at dukhovni.org>
wrote:
>
>
> > On Apr 29, 2018, at 2:56 PM, Phillip Hallam-Baker <phill at hallambaker.com>
> wrote:
> >
> > attackers tend to go for the least effort they have to expend
> > to succeed. this attack is unusual in its seeming unneeded
> > sophistication. this is why the 'this is a test run' theory
> > appeals to me.
> >
> > The did get away with $17 million in untraceable cryptocurrency...
>
> It is good to have a plausible cover story. It might even be true
> that this is just a heist or it might not. And yet it sure looks
> sophisticated for a crypto currency heist. Anyone have tin-foil
> hats for sale?
North Korea has been doing some pretty sophisticated for-profit heists.
Got big into Ransomware at one point.
Its not tin foil at all.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20180429/3e73d84d/attachment.html>
More information about the dns-operations
mailing list