{"id":25420,"date":"2019-02-19T15:23:06","date_gmt":"2019-02-19T15:23:06","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29840\/A-Deep-Dive-On-The-Recent-Widespread-DNS-Hijacking-Attacks.html"},"modified":"2019-02-19T15:23:06","modified_gmt":"2019-02-19T15:23:06","slug":"a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/","title":{"rendered":"A Deep Dive On The Recent Widespread DNS Hijacking Attacks"},"content":{"rendered":"<p>The U.S. government \u2014 along with a number of leading security companies \u2014 recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went down and who was hit have remained shrouded in secrecy.<\/p>\n<p>This post seeks to document the extent of those attacks, and traces the origins of this overwhelmingly successful cyber espionage campaign back to a cascading series of breaches at key Internet infrastructure providers.<\/p>\n<p><a class=\"lightbox\" href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/02\/mideastglobe.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-46628\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/02\/mideastglobe.jpg\" alt=\"\" width=\"595\" height=\"256\" \/><\/a><\/p>\n<p>Before we delve into the extensive research that culminated in this post, it\u2019s helpful to review the facts disclosed publicly so far. On Nov. 27, 2018, <strong>Cisco\u2019s Talos<\/strong> research division <a href=\"https:\/\/blog.talosintelligence.com\/2018\/11\/dnspionage-campaign-targets-middle-east.html\" target=\"_blank\" rel=\"noopener\">published a write-up<\/a> outlining the contours of a sophisticated cyber espionage campaign it dubbed \u201c<strong>DNSpionage<\/strong>.\u201d<\/p>\n<p>The DNS part of that moniker refers to the global \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Domain_Name_System\" target=\"_blank\" rel=\"noopener\"><strong>D<\/strong>omain <strong>N<\/strong>ame <strong>S<\/strong>ystem<\/a>,\u201d which serves as a kind of phone book for the Internet by translating human-friendly Web site names (example.com) into numeric Internet address that are easier for computers to manage.<\/p>\n<p>Talos said the perpetrators of DNSpionage were able to steal email and other login credentials from a number of government and private sector entities in Lebanon and the United Arab Emirates by hijacking the DNS servers for these targets, so that all email and virtual private networking (VPN) traffic was redirected to an Internet address controlled by the attackers.<\/p>\n<p>Talos reported that these DNS hijacks also paved the way for the attackers to obtain SSL encryption certificates for the targeted domains (e.g. webmail.finance.gov.lb), which allowed them to decrypt the intercepted email and VPN credentials and view them in plain text.<\/p>\n<p>On January 9, 2019, security vendor <strong>FireEye<\/strong> <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/01\/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html\" target=\"_blank\" rel=\"noopener\">released its report<\/a>, \u201cGlobal DNS Hijacking Campaign: DNS Record Manipulation at Scale,\u201d which went into far greater technical detail about the \u201chow\u201d of the espionage campaign, but contained few additional details about its victims.<\/p>\n<p>About the same time as the FireEye report, the <strong>U.S. Department of Homeland Security<\/strong> issued a rare emergency directive <a href=\"https:\/\/cyber.dhs.gov\/blog\/#why-cisa-issued-our-first-emergency-directive\" target=\"_blank\" rel=\"noopener\">ordering<\/a> all U.S. federal civilian agencies to secure the login credentials for their Internet domain records. As part of that mandate, DHS published a short list of domain names and Internet addresses that were used in the DNSpionage campaign, although those details did not go beyond what was previously released by either Cisco Talos or FireEye.<\/p>\n<p>That changed on Jan. 25, 2019, when security firm <strong>CrowdStrike<\/strong> <a href=\"https:\/\/www.crowdstrike.com\/blog\/widespread-dns-hijacking-activity-targets-multiple-sectors\/\" target=\"_blank\" rel=\"noopener\">published a blog post<\/a> listing virtually every Internet address known to be (ab)used by the espionage campaign to date. The remainder of this story is based on open-source research and interviews conducted by KrebsOnSecurity in an effort to shed more light on the true extent of this extraordinary \u2014 and ongoing \u2014 attack.<\/p>\n<div id=\"attachment_46592\" class=\"wp-caption aligncenter\" readability=\"33\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-46592\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/02\/cs-ips.jpg\" alt=\"\" width=\"599\" height=\"568\" \/><\/p>\n<p class=\"wp-caption-text\">The \u201cindicators of compromise\u201d related to the DNSpionage campaign, as published by CrowdStrike.<\/p>\n<\/div>\n<h4>PASSIVE DNS<\/h4>\n<p>I began my research by taking each of the Internet addresses laid out in the CrowdStrike report and running them through both <a href=\"https:\/\/www.farsightsecurity.com\/\" target=\"_blank\" rel=\"noopener\">Farsight Security<\/a> and <a href=\"https:\/\/securitytrails.com\" target=\"_blank\" rel=\"noopener\">SecurityTrails<\/a>, services that passively collect data about changes to DNS records tied to tens of millions of Web site domains around the world.<\/p>\n<p>Working backwards from each Internet address, I was able to see that in the last few months of 2018 the hackers behind DNSpionage succeeded in compromising key components of DNS infrastructure for more than 50 Middle Eastern companies and government agencies, including targets in Albania, Cyprus, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Saudi Arabia and the United Arab Emirates.<\/p>\n<p>For example, the passive DNS data shows the attackers were able to hijack the DNS records for <strong>mail.gov.ae<\/strong>, which handles email for government offices of the United Arab Emirates. Here are just a few other interesting assets successfully compromised in this cyber espionage campaign:<\/p>\n<p><strong>-nsa.gov.iq:<\/strong> the National Security Advisory of Iraq<br \/><strong>-webmail.mofa.gov.ae:<\/strong> email for the United Arab Emirates\u2019 Ministry of Foreign Affairs<br \/><strong>-shish.gov.al:<\/strong> the State Intelligence Service of Albania<br \/><strong>-mail.mfa.gov.eg:<\/strong> mail server for Egypt\u2019s Ministry of Foreign Affairs<br \/><strong>-mod.gov.eg:<\/strong> Egyptian Ministry of Defense<br \/><strong>-embassy.ly:<\/strong> Embassy of Libya<br \/><strong>-owa.e-albania.al:<\/strong> the Outlook Web Access portal for the e-government portal of Albania<br \/><strong>-mail.dgca.gov.kw:<\/strong> email server for Kuwait\u2019s Civil Aviation Bureau<br \/><strong>-gid.gov.jo:<\/strong> Jordan\u2019s General Intelligence Directorate<br \/><strong>-adpvpn.adpolice.gov.ae:<\/strong> VPN service for the Abu Dhabi Police<br \/><strong>-mail.asp.gov.al:<\/strong> email for Albanian State Police<br \/><strong>-owa.gov.cy:<\/strong> Microsoft Outlook Web Access for Government of Cyprus<br \/><strong>-webmail.finance.gov.lb:<\/strong> email for Lebanon Ministry of Finance<br \/><strong>-mail.petroleum.gov.eg:<\/strong> Egyptian Ministry of Petroleum<br \/><strong>-mail.cyta.com.cy:<\/strong> Cyta telecommunications and Internet provider, Cyprus<br \/><strong>-mail.mea.com.lb:<\/strong> email access for Middle East Airlines<\/p>\n<p>The passive DNS data provided by Farsight and SecurityTrails also offered clues about when each of these domains was hijacked. In most cases, the attackers appear to have changed the DNS records for these domains (we\u2019ll get to the \u201chow\u201d in a moment) so that the domains pointed to servers in Europe that they controlled.<\/p>\n<p>Shortly after the DNS records for these TLDs were hijacked \u2014 sometimes weeks, sometimes just days or hours \u2014 the attackers were able to obtain SSL certificates for those domains from SSL providers <a href=\"https:\/\/www.comodo.com\" target=\"_blank\" rel=\"noopener\">Comodo<\/a> and\/or <a href=\"https:\/\/letsencrypt.org\" target=\"_blank\" rel=\"noopener\">Let\u2019s Encrypt<\/a>. The preparation for several of these attacks can be seen at <a href=\"https:\/\/crt.sh\" target=\"_blank\" rel=\"noopener\">cert.sh<\/a>, which provides a searchable database of all new SSL certificate creations.<\/p>\n<p>Let\u2019s take a closer look at one example. The CrowdStrike report references the Internet address <strong>139.59.134[.]216<\/strong> (see above), which according to Farsight was home to just seven different domains over the years. Two of those domains only appeared at that Internet address in December 2018, including domains in Lebanon and \u2014 curiously \u2014 Sweden.<\/p>\n<p>The first domain was \u201c<strong>ns0.idm.net.lb<\/strong>,\u201d which is a server for the Lebanese Internet service provider <a href=\"https:\/\/www.idm.net.lb\/\" target=\"_blank\" rel=\"noopener\">IDM<\/a>. From early 2014 until December 2018, ns0.idm.net.lb pointed to <strong>194.126.10[.]18<\/strong>, which appropriately enough is an Internet address based in Lebanon. But as we can see in the screenshot from Farsight\u2019s data below, on Dec. 18, 2018, the DNS records for this ISP were changed to point Internet traffic destined for IDM to a hosting provider in Germany (the 139.59.134[.]216 address).<\/p>\n<div id=\"attachment_46593\" class=\"wp-caption aligncenter\" readability=\"32\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-46593\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/02\/idm-net-lb.jpg\" alt=\"\" width=\"403\" height=\"602\" \/><\/p>\n<p class=\"wp-caption-text\">Source: Farsight Security<\/p>\n<\/div>\n<p>Notice what else is listed along with IDM\u2019s domain at 139.59.134[.]216, according to Farsight:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-46594\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/02\/139.59.jpg\" alt=\"\" width=\"391\" height=\"249\" \/><\/p>\n<p>The DNS records for the domains <strong>sa1.dnsnode.net<\/strong> and <strong>fork.sth.dnsnode.net<\/strong> also were changed from their rightful home in Sweden to the German hosting provider controlled by the attackers in December. These domains are owned by\u00a0<a href=\"https:\/\/www.netnod.se\/\" target=\"_blank\" rel=\"noopener\">Netnod Internet Exchange<\/a>, a major global DNS provider based in Sweden. Netnod also operates one of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Root_name_server\" target=\"_blank\" rel=\"noopener\">13 \u201croot\u201d name servers,<\/a>\u00a0a critical resource that forms the very foundation of the global DNS system.<\/p>\n<p>We\u2019ll come back to Netnod in a moment. But first let\u2019s look at another Internet address referenced in the CrowdStrike report as part of the infrastructure abused by the DNSpionage hackers: <strong>82.196.11[.]127<\/strong>. This address in The Netherlands also is home to the domain <strong>mmfasi[.]com<\/strong>, which Crowdstrike says was one of the attacker\u2019s domains that was used as a DNS server for some of the hijacked infrastructure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-46597\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/02\/82-196.jpg\" alt=\"\" width=\"482\" height=\"409\" \/><\/p>\n<p>As we can see in the screenshot above, 82.196.11[.]127 was temporarily home to another pair of Netnod DNS servers, as well as the server \u201c<strong>ns.anycast.woodynet.net<\/strong>.\u201d That domain is derived from the nickname of\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Bill_Woodcock\" target=\"_blank\" rel=\"noopener\">Bill Woodcock<\/a>, who serves as executive director of\u00a0<a href=\"https:\/\/www.pch.net\/\" target=\"_blank\" rel=\"noopener\">Packet Clearing House (PCH)<\/a>.<\/p>\n<p>PCH is a nonprofit entity based in northern California that also manages significant amounts of the world\u2019s DNS infrastructure, particularly the DNS for more than 500 top-level domains and a number of the Middle East top-level domains targeted by DNSpionage.<span id=\"more-46589\"><\/span><\/p>\n<h4>TARGETING THE REGISTRARS<\/h4>\n<p>Contacted on Feb. 14 by KrebsOnSecurity, <strong>Netnod CEO Lars Michael Jogb\u00e4ck<\/strong> confirmed that parts of Netnod\u2019s DNS infrastructure were hijacked in late December 2018 and early January 2019 after the attackers gained access to accounts at Netnod\u2019s domain name registrar.<\/p>\n<p>Jogb\u00e4ck pointed to <a href=\"https:\/\/www.netnod.se\/news\/statement-on-man-in-the-middle-attack-against-netnod\" target=\"_blank\" rel=\"noopener\">a statement<\/a> the company published on its Web site on Feb. 5, which says Netnod learned of its role in the attack on January 2 and has been in contact with all relevant parties and customers throughout this process.<\/p>\n<p>\u201cAs a participant in an international security co-operation, Netnod became aware on 2 January 2019 that we had been caught up in this wave and that we had experienced a MITM (man-in-the-middle) attack,\u201d the statement reads. \u201cNetnod was not the ultimate goal of the attack. The goal is considered to have been the capture of login details for Internet services in countries outside of Sweden.\u201d<\/p>\n<p>In an interview with this author on Feb. 15, PCH\u2019s Woodcock acknowledged that portions of his organization\u2019s infrastructure were compromised after the DNSpionage hackers abused unauthorized access to its domain name registrar.<\/p>\n<p>As it happens, the registrar records for both pch.net and dnsnode.net point to the same sources: <strong>Key-Systems GmbH<\/strong>, a domain registrar based in Germany; and <strong>Frobbit.se<\/strong>, a company in Sweden. Frobbit is a reseller of Key Systems, and the two companies share some of the same online resources.<\/p>\n<p>Woodcock said the hackers phished credentials that PCH\u2019s registrar used to send signaling messages known as the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Extensible_Provisioning_Protocol\" target=\"_blank\" rel=\"noopener\">Extensible Provisioning Protocol (EPP)<\/a>. EPP is a little-known interface that serves as a kind of back-end for the global DNS system, allowing domain registrars to notify the regional registries (like Verisign) about changes to domain records, including new domain registrations, modifications, and transfers.<\/p>\n<p>\u201cAt the beginning of January, Key-Systems said they believed that their EPP interface had been abused by someone who had stolen valid credentials,\u201d Woodcock said.<\/p>\n<p>Key-Systems declined to comment for this story, beyond saying it does not discuss details of its reseller clients\u2019 businesses.<\/p>\n<p>Netnod\u2019s <a href=\"https:\/\/www.netnod.se\/news\/statement-on-man-in-the-middle-attack-against-netnod\" target=\"_blank\" rel=\"noopener\">written statement<\/a> on the attack referred further inquiries to the company\u2019s security director <strong>Patrik F\u00e4ltstr\u00f6m<\/strong>, who also is co-owner of Frobbit.se.<\/p>\n<p>In an email to KrebsOnSecurity,\u00a0F\u00e4ltstr\u00f6m said unauthorized EPP instructions were sent to various registries by the DNSpionage attackers from both Frobbit and Key Systems.<\/p>\n<p>\u201cThe attack was from my perspective clearly an early version of a serious EPP attack,\u201d he wrote. \u201cThat is, the goal was to get the right EPP commands sent to the registries. I am extremely nervous personally over extrapolations towards the future. Should registries allow any EPP command to come from the registrars? We will always have some weak registrars, right?\u201d<\/p>\n<h4>DNSSEC<\/h4>\n<p>One of the more interesting aspects of these attacks is that both Netnod and PCH are vocal proponents and adopters of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Domain_Name_System_Security_Extensions\" target=\"_blank\" rel=\"noopener\">DNSSEC<\/a> (a.k.a. \u201cDNS Security Extensions\u201d), which is a technology designed to defeat the very type of attack that the DNSpionage hackers were able to execute.<\/p>\n<div id=\"attachment_46631\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-46631\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/02\/dnssec.jpg\" alt=\"\" width=\"598\" height=\"217\" \/><\/p>\n<p class=\"wp-caption-text\">Image: APNIC<\/p>\n<\/div>\n<p>DNSSEC protects applications from using forged or manipulated DNS data, by requiring that all DNS queries for a given domain or set of domains be digitally signed. In DNSSEC, if a name server determines that the address record for a given domain has not been modified in transit, it resolves the domain and lets the user visit the site. If, however, that record has been modified in some way or doesn\u2019t match the domain requested, the name server blocks the user from reaching the fraudulent address.<\/p>\n<p>While DNSSEC can be an effective tool for mitigating attacks such as those launched by DNSpionage, only about 20 percent of the world\u2019s major networks and Web sites have enabled it, according to <a href=\"https:\/\/stats.labs.apnic.net\/dnssec\/XA?c=XA&amp;x=1&amp;g=1&amp;r=1&amp;w=7&amp;g=0\" target=\"_blank\" rel=\"noopener\">measurements<\/a> gathered by <strong>APNIC<\/strong>, the regional Internet address registry for the Asia-Pacific region.<\/p>\n<p>Jogb\u00e4ck said Netnod\u2019s infrastructure suffered three separate attacks from the DNSpionage attackers. The first two occurred in a two-week window between Dec. 14, 2018 and Jan. 2, 2019, and targeted company servers that were <em>not<\/em> protected by DNSSEC.<\/p>\n<p>However, he said the third attack between Dec. 29 and Jan. 2 targeted Netnod infrastructure that <em>was<\/em> protected by DNSSEC and serving its own internal email network. Yet, because the attackers already had access to its registrar\u2019s systems, they were able to briefly disable that safeguard \u2014 or at least long enough to obtain SSL certificates for <a href=\"https:\/\/crt.sh\/?id=1071765455\" target=\"_blank\" rel=\"noopener\">two of Netnod\u2019s<\/a> <a href=\"https:\/\/crt.sh\/?id=1071723007\" target=\"_blank\" rel=\"noopener\">email servers<\/a>.<\/p>\n<p>Jogb\u00e4ck told KrebsOnSecurity that once the attackers had those certificates, they re-enabled DNSSEC for the company\u2019s targeted servers while apparently preparing to launch the second stage of the attack \u2014 diverting traffic flowing through its mail servers to machines the attackers controlled. But Jogb\u00e4ck said that for whatever reason, the attackers neglected to use their unauthorized access to its registrar to disable DNSSEC before later attempting to siphon Internet traffic.<\/p>\n<p>\u201cLuckily for us, they forgot to remove that when they launched their man-in-the-middle attack,\u201d he said. \u201cIf they had been more skilled they would have removed DNSSEC on the domain, which they could have done.\u201d<\/p>\n<p>Woodcock says PCH validates DNSSEC on all of its infrastructure, but that not all of the company\u2019s customers \u2014 particularly some of the countries in the Middle East targeted by DNSpionage \u2014 had configured their systems to fully implement the technology.<\/p>\n<p>Woodcock said PCH\u2019s infrastructure was targeted by DNSpionage attackers in four distinct attacks between December 13, 2018 and January 2, 2019. With each attack, the hackers would turn on their password-slurping tools for roughly one hour, and then switch them off before returning the network to its original state after each run.<\/p>\n<p>The attackers didn\u2019t need to enable their surveillance dragnet longer than an hour each time because most modern smartphones are configured to continuously pull new email for any accounts the user may have set up on his device. Thus, the attackers were able to hoover up a great many email credentials with each brief hijack.<\/p>\n<p>On Jan. 2, 2019 \u2014 the same day the DNSpionage hackers went after Netnod\u2019s internal email system \u2014 they also targeted PCH directly, obtaining <a href=\"https:\/\/crt.sh\/?id=1075482182\" target=\"_blank\" rel=\"noopener\">SSL<\/a> <a href=\"https:\/\/crt.sh\/?id=1075482666\" target=\"_blank\" rel=\"noopener\">certificates<\/a> from Comodo for two PCH domains that handle internal email for the company.<\/p>\n<p>Woodcock said PCH\u2019s reliance on DNSSEC almost completely blocked that attack, but that it managed to snare email credentials for two employees who were traveling at the time. Those employees\u2019 mobile devices were downloading company email via hotel wireless networks that \u2014 as a prerequisite for using the wireless service \u2014 forced their devices to use the hotel\u2019s DNS servers, not PCH\u2019s DNNSEC-enabled systems.<\/p>\n<p>\u201cThe two people who did get popped, both were traveling and were on their iPhones, and they had to traverse through captive portals during the hijack period,\u201d Woodcock said. \u201cThey had to switch off our name servers to use the captive portal, and during that time the mail clients on their phones checked for new email. Aside from that, DNSSEC saved us from being really, thoroughly owned.\u201d<\/p>\n<p>Because PCH had protected its domains with DNSSEC, the practical effect of the hijack against its mail infrastructure was that for roughly an hour nobody but the two remote employees received any email.<\/p>\n<p>\u201cFor essentially all of our users, what it looked like was the mail server just wasn\u2019t available for a short period,\u201d Woodcock said. \u201cIt didn\u2019t resolve for a while if they happened to be checking their phone or whatever, and each person thought well that\u2019s funny, I\u2019ll check it back in a while. And by the time they checked again it was working fine. A bunch of our staff noticed a brief outage in our email service, but nobody thought enough of it to discuss it with anyone else or open a ticket.\u201d<\/p>\n<p>But the DNSpionage hackers were not deterred. In a letter to its customers sent earlier this month, PCH said a forensic investigation determined that on Jan. 24 a computer which holds its Web site user database had been compromised. The user data stored in the database included customer usernames, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bcrypt\" target=\"_blank\" rel=\"noopener\">bcrypt<\/a> password hashes, emails, addresses, and organization names.<\/p>\n<p>\u201cWe see no evidence that the attackers accessed the user database or exfiltrated it,\u201d the message reads. \u201cSo we are providing you this information as a matter of transparency and precaution, rather than because we believe that your data was compromised.\u201d<\/p>\n<h4>IMPROVEMENTS<\/h4>\n<p>Multiple experts interviewed for this story said one persistent problem with DNS-based attacks is that a great deal of organizations tend to take much of their DNS infrastructure for granted. For example, many entities don\u2019t even log their DNS traffic, nor do they keep a close eye on any changes made to their domain records.<\/p>\n<p>Even for those companies making an effort to monitor their DNS infrastructure for suspicious changes, some monitoring services only take snapshots of DNS records passively, or else only do so actively on a once-daily basis. Indeed, Woodcock said PCH relied on no fewer than three monitoring systems, and that none of them alerted his organization to the various one-hour hijacks that hit PCH\u2019s DNS systems.<\/p>\n<p>\u201cWe\u00a0had three different commercial DNS monitoring services, none of which caught it,\u201d he said. \u201cNone of them even warned us that it had happened after the fact.\u201d<\/p>\n<p>Woodcock said PCH has since set up a system to poll its own DNS infrastructure multiple times each hour, and to alert immediately on any changes.<\/p>\n<p>Jogb\u00e4ck said Netnod also has beefed up its monitoring, as well as redoubled efforts to ensure that all of the available options for securing their domain infrastructure were being used. For instance, the company had not previously secured all of its domains with a \u201c<a href=\"https:\/\/www.icann.org\/resources\/pages\/locked-2013-05-03-en\" target=\"_blank\" rel=\"noopener\">domain lock<\/a>,\u201d a service that requires a registrar to take additional authentication steps before making any modifications to a domain\u2019s records.<\/p>\n<p>\u201cWe are really sad we didn\u2019t do a better job of protecting our customers, but we are also a victim in the chain of the attack,\u201d Jogb\u00e4ck said. \u201cYou can change to a better lock after you\u2019ve been robbed, and hopefully make it more difficult for someone to do it again. But I can truly say we have learned a tremendous amount from being a victim in this attack, and we are now much better off than before.\u201d<\/p>\n<p>Woodcock said he\u2019s worried that Internet policymakers and other infrastructure providers aren\u2019t taking threats to the global DNS seriously or urgently enough, and he\u2019s confident the DNSpionage hackers will have plenty of other victims to target and exploit in the months and years ahead.<\/p>\n<p>\u201cAll of this is a running battle,\u201d he said. <span class=\"pullquote pqleft\">\u201cThe Iranians are not just trying to do these attacks to have an immediate effect. They\u2019re trying to get into the Internet infrastructure deeply enough so they can get away with this stuff whenever they want to.<\/span> They\u2019re looking to get as many ways in as possible that they can use for specific goals in the future.\u201d<\/p>\n<h4>RECOMMENDATIONS<\/h4>\n<p><strong>John Crain<\/strong> is chief security, stability and resiliency officer at <a href=\"https:\/\/en.wikipedia.org\/wiki\/ICANN\" target=\"_blank\" rel=\"noopener\">ICANN<\/a>, the non-profit entity that oversees the global domain name industry. Crain said many of the best practices that can make it more difficult for attackers to hijack a target\u2019s domains or DNS infrastructure have been known for more than a decade.<\/p>\n<p>\u201cA lot of this comes down to data hygiene,\u201d Crain said. \u201cLarge organizations down to mom-and-pop entities are not paying attention to some very basic security practices, like multi-factor authentication. These days, if you have a sub-optimal security stance, you\u2019re going to get owned. That\u2019s the reality today. We\u2019re seeing much more sophisticated adversaries now taking actions on the Internet, and if you\u2019re not doing the basic stuff they\u2019re going to hit you.\u201d<\/p>\n<p>Some of those best practices for organizations include:<\/p>\n<p>-Use DNSSEC (both signing zones and validating responses)<\/p>\n<p>-Use registration features like Registry Lock that can help protect domain names records from being changed<\/p>\n<p>-Use access control lists for applications, Internet traffic and monitoring<\/p>\n<p>-Use 2-factor authentication, and require it to be used by all relevant users and subcontractors<\/p>\n<p>-In cases where passwords are used, pick unique passwords and consider password managers<\/p>\n<p>-Review accounts with registrars and other providers<\/p>\n<p>-Monitor certificates by monitoring, for example, <a href=\"https:\/\/www.certificate-transparency.org\/how-ct-works\" target=\"_blank\" rel=\"noopener\">Certificate Transparency Logs<\/a><\/p>\n<p class=\"mid-banner\"><a href=\"https:\/\/www.akamai.com\/us\/en\/security.jsp?utm_source=krebsonsecurity&amp;utm_medium=display&amp;utm_id=F-MC-44701&amp;utm_campaign=unifiedsecurity_digital_2019&amp;utm_content=unifiedsecurity_global&amp;utm_term=unifiedsecurity_ros\"><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/b-akamai\/15.jpg\" \/><\/a><\/p>\n<p class=\"small\">Tags: <a href=\"https:\/\/krebsonsecurity.com\/tag\/apnic\/\" rel=\"tag\">APNIC<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/bill-woodcock\/\" rel=\"tag\">Bill Woodcock<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/cisco-talos\/\" rel=\"tag\">Cisco Talos<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/comodo\/\" rel=\"tag\">Comodo<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/crowdstrike\/\" rel=\"tag\">CrowdStrike<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/dhs\/\" rel=\"tag\">DHS<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/dnspionage\/\" rel=\"tag\">DNSpionage<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/dnssec\/\" rel=\"tag\">DNSSEC<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/epp\/\" rel=\"tag\">EPP<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/extensible-provisioning-protocol\/\" rel=\"tag\">extensible provisioning protocol<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/farsight-security\/\" rel=\"tag\">Farsight Security<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/fireeye\/\" rel=\"tag\">FireEye<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/frobbit\/\" rel=\"tag\">Frobbit<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/icann\/\" rel=\"tag\">ICANN<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/john-crain\/\" rel=\"tag\">John Crain<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/key-systems\/\" rel=\"tag\">Key Systems<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/lars-michael-jogback\/\" rel=\"tag\">Lars Michael Jogb\u00e4ck<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/letsencrypt\/\" rel=\"tag\">LetsEncrypt<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/netnod\/\" rel=\"tag\">Netnod<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/packet-clearing-house\/\" rel=\"tag\">Packet Clearing House<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/patrik-faltstrom\/\" rel=\"tag\">Patrik F\u00e4ltstr\u00f6m<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/pch\/\" rel=\"tag\">PCH<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/securitytrails\/\" rel=\"tag\">SecurityTrails<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/tag\/u-s-department-of-homeland-security\/\" rel=\"tag\">U.S. Department of Homeland Security<\/a><\/p>\n<p class=\"postmetadata alt\"><small>This entry was posted on Monday, February 18th, 2019 at 8:51 am and is filed under <a href=\"https:\/\/krebsonsecurity.com\/category\/sunshine\/\" rel=\"category tag\">A Little Sunshine<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/category\/data-breaches\/\" rel=\"category tag\">Data Breaches<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/category\/comingstorm\/\" rel=\"category tag\">The Coming Storm<\/a>. You can follow any comments to this entry through the <a href=\"https:\/\/krebsonsecurity.com\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/feed\/\">RSS 2.0<\/a> feed. You can skip to the end and leave a comment. Pinging is currently not allowed.<\/small><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29840\/A-Deep-Dive-On-The-Recent-Widespread-DNS-Hijacking-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25421,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5886],"class_list":["post-25420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacydnscyberwarphish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Deep Dive On The Recent Widespread DNS Hijacking Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Deep Dive On The Recent Widespread DNS Hijacking Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-19T15:23:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"215\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"A Deep Dive On The Recent Widespread DNS Hijacking Attacks\",\"datePublished\":\"2019-02-19T15:23:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/\"},\"wordCount\":3427,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg\",\"keywords\":[\"headline,hacker,privacy,dns,cyberwar,phish\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/\",\"name\":\"A Deep Dive On The Recent Widespread DNS Hijacking Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg\",\"datePublished\":\"2019-02-19T15:23:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg\",\"width\":500,\"height\":215},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,dns,cyberwar,phish\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacydnscyberwarphish\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Deep Dive On The Recent Widespread DNS Hijacking Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Deep Dive On The Recent Widespread DNS Hijacking Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/","og_locale":"en_US","og_type":"article","og_title":"A Deep Dive On The Recent Widespread DNS Hijacking Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-19T15:23:06+00:00","og_image":[{"width":500,"height":215,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"A Deep Dive On The Recent Widespread DNS Hijacking Attacks","datePublished":"2019-02-19T15:23:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/"},"wordCount":3427,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg","keywords":["headline,hacker,privacy,dns,cyberwar,phish"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/","name":"A Deep Dive On The Recent Widespread DNS Hijacking Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg","datePublished":"2019-02-19T15:23:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks.jpg","width":500,"height":215},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,dns,cyberwar,phish","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydnscyberwarphish\/"},{"@type":"ListItem","position":3,"name":"A Deep Dive On The Recent Widespread DNS Hijacking Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25420"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25420\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25421"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}