[dns-operations] FireEye reports long-running DNS hijacking campaign

Barry Raveendran Greene bgreene at senki.org
Sat Jan 12 17:05:52 UTC 2019


The press cycle is disturbing. The quick summary, threat-actors are breaking into the registrar and (it appears) the primary servers. They then set up long term MITM interceptions through proxies. 

It is not really a “hijack.” 

> On Jan 11, 2019, at 17:53, Dave Lawrence <tale at dd.org> wrote:
> 
> For those of you who may have missed the news...
> 
> https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html
> 
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.dns-oarc.net
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations
> dns-operations mailing list
> https://lists.dns-oarc.net/mailman/listinfo/dns-operations





More information about the dns-operations mailing list