theregister.co.uk

Reports and investigations into Distributed Denial of Service attacks.

theregister.co.uk

Postby Red Dwarf » Sun Sep 04, 2011 6:26 pm

Twittering revealed a claim by some Turks that they have defaced TheReister.co.uk
" theregister.co.uk defaced: http://twitpic.com/6g40f1 "

Currently the site is not responding
User avatar
Red Dwarf
You are kiillllling-a my bizinisss!
 
Posts: 10478
Joined: Tue Jun 27, 2006 2:01 am

Re: theregister.co.uk

Postby AlphaCentauri » Sun Sep 04, 2011 8:49 pm

http://nakedsecurity.sophos.com/2011/09 ... 2Bsecurity

The amazing thing is that theregister.co.uk couldn't get their hosting service to return their phone calls?! Unbelievable!
User avatar
AlphaCentauri
You are kiillllling-a my bizinisss!
 
Posts: 5989
Joined: Thu Mar 01, 2007 3:01 am

Re: theregister.co.uk

Postby issviews » Mon Sep 05, 2011 3:35 pm

Just visited the site now (20.25 gmt) and all was up and running fine. No sign of any defacement :D

The Register have commented though: http://www.theregister.co.uk/2011/09/05 ... e_updated/
issviews
 

Re: theregister.co.uk

Postby NotBuyingIt » Mon Sep 05, 2011 5:30 pm

AlphaCentauri wrote:The amazing thing is that theregister.co.uk couldn't get their hosting service to return their phone calls?! Unbelievable!


By their hosting service, you mean Rackspace Hosting in San Antonio, Texas? Perhaps most their security team is out of the office during the Labor Day holiday. (Shouldn't be the central Texas wild fires yet.)
NotBuyingIt
Spammer Killing Machine
 
Posts: 611
Joined: Sun Jun 13, 2010 5:22 pm

Re: theregister.co.uk

Postby AlphaCentauri » Mon Sep 05, 2011 6:16 pm

I guess it was the registrar they were talking about. They posted this about NetNames:
Update
So we were one of a very small number of domains that were redirected, according to an "initial statement" from NetNames, reproduced in full below. To say we are not pleased is an understatement.
At approximately 2100BST on Sunday 4 September 2011 a very small number of customer domains were redirected to an unauthorised domain name server (DNS server). This was done by placing unauthorised re-delegation orders through to the registries via our provisioning system. These orders updated the address of the master DNS servers responsible for serving data for these domains. The rogue name server then served incorrect DNS data to redirect legitimate web traffic intended for customer web sites through to a hacker holding page branded TurkGuvenligi. The unauthorised orders were added by using a SQL injection attack to gain access to a number of our customer accounts.

The illegal changes were reversed quickly to bring service back to the customers impacted and the accounts concerned have been disabled to block any further access to the systems. NetNames considers the security of its systems and the data within to be of paramount importance. While no-one can completely defend against such sustained and concentrated malicious attacks we will continue to review our systems to ensure that we provide our customers a solid, robust and above all secure service.
User avatar
AlphaCentauri
You are kiillllling-a my bizinisss!
 
Posts: 5989
Joined: Thu Mar 01, 2007 3:01 am


Return to Denial of Service Attacks [DDOS]

Who is online

Users browsing this forum: No registered users and 1 guest

cron