Editor’s Note: In a separate post, Lucian Constantin explains how a researcher hijacked a .io top level domain nameserver and what exposures it has surfaced about registries for country-code top-level domains.
Over the years hackers have hijacked many domain names by manipulating their DNS records to redirect visitors to malicious servers. While there’s no perfect solution to prevent such security breaches, there are actions that domain owners can take to limit the impact of these attacks on their Web services and users.
Just last Friday, attackers managed to change the DNS records for 751 domain names that had been registered and managed through Gandi.net, a large domain registrar. Visitors to the affected domains were redirected to an attacker-controlled server that launched browser-based exploits to infect computers with malware.
Read more at The New Stack