A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Bill Woodcock woody at pch.net
Sat Feb 23 19:29:20 UTC 2019

> On Feb 23, 2019, at 11:13 AM, Keith Medcalf <kmedcalf at dessus.com> wrote:
> So in other words this was just an old school script kiddie taking advantage of DNS registrars, the only difference being this was a whole whack of script kiddies acting in concert directed by a not-quite-so-stupid script kiddie, with some "modernz" thrown in for good measure.

It’s Iranian military.  If you want to call them script kiddies, that’s up to you, but people familiar with the campaign characterize it as an APT, and have been for the several years that it’s been going on.

> the targets perfectly match those that the NSA would choose

Amusing bedfellows, if they weren’t so annoying.

> The second takeaway being that DNSSEC is useless

You seem to have gotten that one backwards, by over-straining yourself in an effort to seem clever.

> Did I miss anything?

Apparently, yes.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20190223/9f65f550/attachment.sig>

More information about the NANOG mailing list