#dnspionage

2020-01-24

Does Your Domain Have a Registry Lock? - If you’re running a business online, few things can be as disruptive or destructive to your brand ... more: krebsonsecurity.com/2020/01/do #publicdomainregistry #raymonddijkxhoorn #latestwarnings #thecomingstorm #petercholnoky #registrarlock #openprovider #registrylock #webfraud2.0 #dnspionage #e-hawk.net #whatsapp #arnovis #dnssec #e-hawk #csc #pdr

RT @r00tbsd@twitter.com

Our (with @SecurityBeard@twitter.com) latest work on #DNSpionage is online: blog.talosintelligence.com/201 we analyzed a bizarre version of #DNSpionage and we identified a new malware named #Karkoff. We put a bonus: a small link between this campaigns and the alleged #Oilrig leak from last week...

🐦🔗: twitter.com/r00tbsd/status/112

2019-03-23

DNSpionage: Massive Angriffe auf Mail- und VPN-User

Für Angriffe auf Firmen und Regierungsstellen im Nahen Osten haben Unbekannte die DNS-Infrastruktur einer deutschen Firma missbraucht. Der Ablauf der Attacke.

#DNSpionage #Angriffe #Mail #VPN #DNS #Infrastruktur #Internet #Hack

heise.de/ct/artikel/DNSpionage

#DNSPIONAGE
Détails techniques sur les récentes attaques contre les noms de domaine
bortzmeyer.org/dnspionage.html

Stéphane Bortzmeyerbortzmeyer@mastodon.gougere.fr
2019-02-25

C'est vraiment bien, les certificats au grand jour, on voit même les certificats des méchants pirates crt.sh/?id=831555581 #DNSpionage bortzmeyer.org/6962.html

Pierre LEMASSONsirchamallow
2019-02-25

[#CyberSec] L'ICANN signale une vague d'attaques informatiques inédite en cours contre l'infrastructure DNS dans le monde entier huffingtonpost.fr/2019/02/22/u (HuffPost)
techcrunch.com/2019/02/23/ican (Techcrunch)

Stéphane Bortzmeyerbortzmeyer@mastodon.gougere.fr
2019-02-24

Rigolo, je découvre que l'Irak a un truc de sécurité nationale qui s'appelle NSA nsa.gov.iq/

(Je vois ça parce qu'il y a un IOC de #DNSpionage qui les désigne : ils ont été piratés le 2 octobre 2018.)

#DNS

RT @AZobec@twitter.com

With @GlaCiuS_@twitter.com we wrote an article about what we observed during an incident response few months ago performing by CERT-OPMD (@openminded_c@twitter.com ) . The malware used was #DNSPIONAGE.
blog-cert.opmd.fr/dnspionage-f
We hope it may help you to hunt some identical threats.

🐦🔗: twitter.com/AZobec/status/1083

RT @r00tbsd@twitter.com

Interesting, @FireEye@twitter.com published some details on the infrastructure used by the attacker for the DNS redirection mentioned in our #DNSpionage post: fireeye.com/blog/threat-resear (our post for the context: blog.talosintelligence.com/201)

🐦🔗: twitter.com/r00tbsd/status/108

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst