[dns-operations] BGP Hijack of Amazon DNS

Daniel Griggs daniel at internetnz.net.nz
Sun Apr 29 20:33:44 UTC 2018


The bitcoin wallet already had 17 million, in this attack they only got
away with $150,000.
Which seems like they had better ways of collecting money than through this
attack.


On 30 April 2018 at 06:56, Phillip Hallam-Baker <phill at hallambaker.com>
wrote:

> On Sun, Apr 29, 2018 at 2:05 PM, Randy Bush <randy at psg.com> wrote:
>
>> > I tend to think that the typical actual attacker, *today*, does not
>> > really understand the TTL and its use, and leaves the default TTL.
>>
>> attackers tend to go for the least effort they have to expend
>> to succeed.  this attack is unusual in its seeming unneeded
>> sophistication.  this is why the 'this is a test run' theory
>> appeals to me.
>
>
> ​The did get away with $17 million in untraceable cryptocurrency...​
>
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
>
>


-- 
Daniel Griggs
e: daniel at internetnz.net.nz
p: +64 27 448 8230
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20180430/6c2b78ac/attachment.html>


More information about the dns-operations mailing list