[dns-operations] FireEye reports long-running DNS hijacking campaign
Barry Raveendran Greene
bgreene at senki.org
Sat Jan 12 17:05:52 UTC 2019
The press cycle is disturbing. The quick summary, threat-actors are breaking into the registrar and (it appears) the primary servers. They then set up long term MITM interceptions through proxies.
It is not really a “hijack.”
> On Jan 11, 2019, at 17:53, Dave Lawrence <tale at dd.org> wrote:
>
> For those of you who may have missed the news...
>
> https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
More information about the dns-operations
mailing list