|
The threatening emails sent on December 13 caused mass evacuations, closures, and lockdowns in the US, Canada, and other countries around the world. The emails threatened to blow up buildings and schools unless recipients paid a $20,000 ransom. Ars Technica’s Dan Goodin reports that an “investigation shows the spam run worked by abusing a weakness at GoDaddy that allowed the scammers to hijack at least 78 domains belonging to Expedia, Mozilla, Yelp, and other legitimate people or organizations.”
Analysis of historical Internet records by Researcher Ronald Guilmette lead him to believe that the stolen domain names were *not* simply ones that some bad actor has put entirely fraudulent WHOIS data in for. Goodin writes: “After noticing that virtually all of the affected domains were receiving domain-resolution service from GoDaddy prior to being hijacked, Guilmette theorized that a system-wide vulnerability was somehow involved.”
Godaddy has since issued a response confirming that threat actor(s) abused our DNS setup process. “We’ve identified a fix and are taking corrective action immediately.”
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byRadix