Network Solutions investigating DNS hijack

The same pro-Palestinian group that hit LeaseWeb earlier this week claimed responsibility
  • Jeremy Kirk (IDG News Service)
  • — 09 October, 2013 01:04
Pro-Palestinian hackers compromised DNS records held by Network Solutions, redirecting several websites to other domains.

Pro-Palestinian hackers compromised DNS records held by Network Solutions, redirecting several websites to other domains.

Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies.

Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other website-related administration services.

A group calling itself the KDMS Team claimed responsibility on Twitter. The websites affected included those of the security companies AVG and Avira; the messaging platform WhatsApp; a pornography site, RedTube; and Web metrics company Alexa.

John Herbkersman, Web.com's senior director for public communications, said Network Solutions was aware of the problem.

"Cybercrime today is rampant," he said. "We just continue to try to do our best to bring in the best people and bring in the best equipment."

Avira said its own network and customers were not affected, but that the DNS (Domain Name System) records -- administered by Network Solutions -- were changed to point to other domains, which is known as DNS hijacking.

"It appears that our account used to manage the DNS records registered at Network Solutions has received a fake password-reset request which was honored by the provider," the company wrote on its blog. "Using the new credentials, the cybercriminals have been able to change the entries to point to their DNS servers."

No malicious code was delivered by the domain to which Avira Web surfers were redirected to, the company said.

Hackers have had notable successes in recent months compromising DNS providers. The DNS allows a domain name, such as idg.com, to be translated into an IP address that can be called into a browser.

Companies such as Network Solutions hold those DNS records, which if modified, can send Web surfers to different domains.

Earlier this week, hosting provider LeaseWeb saw its main domain redirected to an incorrect IP address after hackers apparently obtained the administrator password from the company's domain registrar. The KDMS team said it was responsible for that hack.

In August, hackers compromised an Australian IT services company, Melbourne IT, and modified DNS records that affected Twitter, The New York Times, the Huffington Post and ShareThis. A pro-Syrian group, the Syrian Electronic Army, claimed responsibility.

Melbourne IT said an account belonging to a reseller of its services was compromised through a targeted spear-phishing attack, which allowed hackers to change the DNS records for several domains. Spear phishing involves sending an email with malware or a malicious link intending to infect the recipient's computer.

KDMS, which could not be immediately reached, posted several screenshots on Twitter, including one that affected WhatsApp's domain. The message asserted that the region known as Palestine has been stolen, and that prisoners should be released from Israeli jails.

"We want peace," the message read. "Long live Palestine."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags: Network Solutions, Avira, security, AVG

Financial services firms to increase cyber security budgets this year, PwC claims

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-2404

Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-2404

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.