Wednesday, November 28, 2012

Go Daddy: Theft of our DNS records was carried with the use of phishing


According to the registrar, the incident is not due to the detection of vulnerability management system DNS.

Antivirus company Sophos researchers have discovered that hackers managed to compromise DNS records web-sites on the hosting company Go Daddy. As a result of the incident, a number of portals that are customers of the registrar, redirect your users to malicious resources, which, in turn, contain malicious exploits vulnerabilities.

Operating systems of victims of the attack were infected with malware-extortioners.

When the incident became known to the general public, Go Daddy could not explain exactly how the hackers managed to carry out hacking. But now one of the leaders of the registrar Scott Gerlach said that the reason was the successful hacking phishing attack.

"The Go Daddy recorded a very small number of customer accounts, in which attackers have harmful changes. At the moment, we eliminate these threats as they are discovered. In addition, compromised passwords have been changed - assured Gerlach. - We assume that the victims of the incident was used phishing, or their home computers were infected Cool Exploit ".


The expert also said that this is not a consequence of vulnerability management system DNS or personal account of the account holder. In addition, Gerlach advised customers to 'pass a two-step authentication'.

No comments:

Post a Comment