[dns-operations] BGP Hijack of Amazon DNS

Phillip Hallam-Baker phill at hallambaker.com
Sun Apr 29 20:32:45 UTC 2018


On Sun, Apr 29, 2018 at 3:07 PM, Viktor Dukhovni <ietf-dane at dukhovni.org>
wrote:

>
>
> > On Apr 29, 2018, at 2:56 PM, Phillip Hallam-Baker <phill at hallambaker.com>
> wrote:
> >
> > attackers tend to go for the least effort they have to expend
> > to succeed.  this attack is unusual in its seeming unneeded
> > sophistication.  this is why the 'this is a test run' theory
> > appeals to me.
> >
> > ​The did get away with $17 million in untraceable cryptocurrency...​
>
> It is good to have a plausible cover story.  It might even be true
> that this is just a heist or it might not.  And yet it sure looks
> sophisticated for a crypto currency heist.  Anyone have tin-foil
> hats for sale?


​North Korea has been doing some pretty sophisticated for-profit heists.
Got big into Ransomware at one point.

Its not tin foil at all. ​
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20180429/3e73d84d/attachment.html>


More information about the dns-operations mailing list