lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200806271556.34044.turkay.eren@gmail.com> Date: Fri, 27 Jun 2008 15:56:33 +0300 From: Eren Türkay <turkay.eren@...il.com> To: full-disclosure@...ts.grok.org.uk Cc: Dancho Danchev <dancho.danchev@...il.com> Subject: Re: ICANN and IANA’s domains hijacked by Turkish hacking group On 27 Jun 2008 Fri 01:49:00 Dancho Danchev wrote: > Hello, Hi > The official domains of ICANN, the Internet Corporation for Assigned > Names and Numbers, and IANA, the Internet Assigned Numbers Authority > were hijacked earlier today, by the NetDevilz Turkish hacking group > which also hijacked Photobucket's domain on the 18th of June. > > http://blogs.zdnet.com/security/?p=1356 Then, how did they do it? There is no comment on how it was done and ZDNet blog says that attackers refused to answer zone-h's questions. Any suggestions? I think that there is no new way of hijacking domain names. There should be something like social engineering and unfortunately, there is no patch for human stupidity. > Regards Regards, Eren _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists