{"id":456,"date":"2008-06-10T18:23:00","date_gmt":"2008-06-10T23:23:00","guid":{"rendered":"http:\/\/alsplace.aldenbaker.com\/alsplace\/internet\/456\/comcast%e2%80%99s-dns-records-hijacked-redirect-to-hacked-page\/"},"modified":"2008-06-10T18:23:00","modified_gmt":"2008-06-10T23:23:00","slug":"comcast%e2%80%99s-dns-records-hijacked-redirect-to-hacked-page","status":"publish","type":"post","link":"http:\/\/alsplace.info\/?p=456","title":{"rendered":"Comcast\u2019s DNS records hijacked, redirect to hacked page"},"content":{"rendered":"\n<!-- ALL ADSENSE ADS DISABLED -->\n<h4 align=\"justify\">May 29th, 2008 <!-- by Dancho Danchev --><\/h4>\n<p class=\"meta\" align=\"justify\">Posted by Dancho Danchev<\/p>\n<p class=\"meta\" align=\"justify\">For a couple of hours yesterday, Comcast&rsquo;s Internet Portal (<a href=\"http:\/\/en.wikipedia.org\/wiki\/Comcast#Hacks\" title=\"Comcast.net hijacked\">comcast.net<\/a>) had its DNS records hijacked and a defaced web<a href=\"http:\/\/blogs.zdnet.com\/security\/images\/comcast_net_dns_hijacked.JPG\" title=\"Comcast&rsquo;s <a href=\"http:\/\/rivervet.com\/\">do you need a prescription for propecia<\/a>  DNS records hijacked&#8221;><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/blogs.zdnet.com\/security\/images\/comcast_net_dns_hijacked.JPG\" border=\"0\" alt=\"Comcast&rsquo;s DNS records hijacked\" width=\"250\" height=\"250\" align=\"right\" \/><\/a> page was loading from third-party domains. Further investigation into this incident reveals a connection between the group responsible for Comcast&rsquo;s DNS hijacking and previous incidents such as the&nbsp; <a href=\"http:\/\/www.scmagazineus.com\/Justin-Timberlake-Hilary-Duff-Tila-Tequila-MySpace-profiles-compromised-to-impress-hacker-group\/article\/99727\/\" title=\"Justin Timberlake, Hilary Duff, Tila Tequila\">defacements of Justin Timberlake, Hilary Duff and Tila Tequila&rsquo;s MySpace profiles<\/a>. Comcast.net wasn&rsquo;t hacked, its <a href=\"http:\/\/www.theregister.co.uk\/2008\/05\/29\/comcast_hack\/\" title=\"Comcast.net hijacked\">DNS records got hijacked<\/a>, so whenever someone visited comcast.net, the defaced page was loading from different servers. Let&rsquo;s assess the incident by taking a look at the way <a href=\"http:\/\/blogs.ittoolbox.com\/security\/dmorrill\/archives\/comcast-email-servers-hacked-25006\" title=\"Comcast.net hijacked\">Comcast&rsquo;s DNS records changed yesterday<\/a>, find out who&rsquo;s behind it, and how a couple of hours later Comcast restored access to its domain.<\/p>\n<p align=\"justify\">On 28-May-2008 23:05:43 EDT Comcast.net&rsquo;s WHOIS records were hijacked, and were returning the following information :<\/p>\n<blockquote>\n<p align=\"justify\">Administrative Contact:<br \/> Domain Registrations, Comcast<br \/> kryogenicsdefiant@gmail.com<br \/> Defiant still raping 2k8 ebk<br \/> 69 dick tard lane<br \/> dildo room<br \/> PHILADELPHIA, PA 19103<br \/> US<br \/> 4206661870 fax: 6664200187<\/p>\n<\/blockquote>\n<p align=\"justify\">During that time, the page used in the defacement was loading from two different locations, namely, <strong>freewebs.com \/buttpussy69<\/strong> and <strong>freewebs.com \/kryogeniks911<\/strong> which continue returning the message :<\/p>\n<blockquote>\n<p align=\"justify\">KRYOGENIKS EBK and DEFIANT RoXed COMCAST sHouTz To VIRUS Warlock elul21 coll1er seven<\/p>\n<\/blockquote>\n<p align=\"justify\"><!-- -->Due to the changed DNS records, comcast.net was also unreachable for a&nbsp; certain period of time, and within the next couple of hours upon Comcast noticing the incident and taking actions to restore access to their domain, a &ldquo;Web Site Under Construction&rdquo; message was appearing.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blogs.zdnet.com\/security\/images\/comcast_net_dns_hijacked3.jpg\" title=\"Comcast&rsquo;s DNS records hijacked\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/blogs.zdnet.com\/security\/images\/comcast_net_dns_hijacked3.jpg\" border=\"0\" alt=\"Comcast&rsquo;s DNS records hijacked\" width=\"400\" height=\"200\" \/><\/a><\/p>\n<p align=\"justify\">Comcast&rsquo;s original DNS records returned the their original state on 29-May-2008 01:18:02 EDT :<\/p>\n<blockquote>\n<p align=\"justify\">Administrative Contact:<br \/> Domain Registrations, Comcast<br \/> domregadmin@comcastonline.com<br \/> Comcast Cable Communications Mgmt. LLC<br \/> One Comcast Center<br \/> 40th Fl.<br \/> PHILADELPHIA, PA 19103<br \/> US<br \/> 215-286-8665 fax: 6664200187<\/p>\n<\/blockquote>\n<p align=\"justify\">The hijacking was also picked up by uptime monitoring services, with the longest downtime for the Comcast.net domain for the past three years (98.29%) or 18 minutes :<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blogs.zdnet.com\/security\/images\/comcast_net_dns_hijacked2.JPG\" title=\"Comcast&rsquo;s DNS records hijacked\"><\/a><\/p>\n<p align=\"justify\"><a href=\"http:\/\/blogs.zdnet.com\/security\/images\/comcast_net_dns_hijacked1.JPG\" title=\"Comcast&rsquo;s DNS records hijacked\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/blogs.zdnet.com\/security\/images\/comcast_net_dns_hijacked1.JPG\" border=\"0\" alt=\"Comcast&rsquo;s DNS records hijacked\" width=\"500\" height=\"500\" \/><\/a><\/p>\n<p align=\"justify\">Tracking down the DNS hijackers using the message left, leads to the well known Kryogeniks group (<strong>kryogeniks.org<\/strong>) , elul21 (<strong>username.com\/tmp<\/strong>) as another web site defacer part of the WINGS Hacking Team, next to CoLL1er.<\/p>\n<p align=\"justify\">Investigation is ongoing, details will posted once more data is gathered.<\/p>\n<div class=\"bloggerDesc clear\" align=\"justify\">Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, malware and E-crime incident response. Dancho is also involved in business development, marketing research and competitive intelligence as an independent contractor. He&#39;s been an active security blogger since 2007, and maintains a popular <a href=\"http:\/\/ddanchev.blogspot.com\/\">security blog<\/a> sharing real-time threats intelligence data with the rest of the community on a daily basis.<\/div>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d456').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d456\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d456').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d456').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"excerpt":{"rendered":"<p>May 29th, 2008 Posted by Dancho Danchev For a couple of hours yesterday, Comcast&rsquo;s Internet Portal (comcast.net) had its DNS records hijacked and a defaced web<\/p>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d456').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d456\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d456').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d456').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,26],"tags":[],"_links":{"self":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/456"}],"collection":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=456"}],"version-history":[{"count":0,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/456\/revisions"}],"wp:attachment":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=456"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}