Domain Name Hijacking: Difference between revisions

Applied modification ruleset: Automated workflow
 
Line 27: Line 27:
==Notorious Cases==
==Notorious Cases==
* ''Sea Turtle Attacks''  <br/>
* ''Sea Turtle Attacks''  <br/>
On April 17, 2019, [[Cisco]]'s Talos security division identified a hacker group called "Sea Turtle" conducting espionage via DNS hijacking among at least 40 organizations. Se Turtle was able to compromise [[ccTLD|country-code top-level domains]].<ref>[https://www.wired.com/story/sea-turtle-dns-hijacking/ Sea Turtle Attacks, Wired]</ref> The victims included telecoms, internet service providers, registrars, ministries of foreign affairs, intelligence agencies, military targets, and energy-related groups, all based in the Middle East and North Africa. The hackers silently carried out Man in the Middle Attacks to intercept all internet data being sent to the victim organizations.
On April 17, 2019, [[Cisco]]'s Talos security division identified a hacker group called "Sea Turtle" conducting espionage via DNS hijacking among at least 40 organizations. Se Turtle was able to compromise [[ccTLD|country-code top-level domains]].<ref>[https://www.wired.com/story/sea-turtle-dns-hijacking/ Sea Turtle Attacks, Wired]</ref> The victims included telecoms, Internet service providers, registrars, ministries of foreign affairs, intelligence agencies, military targets, and energy-related groups, all based in the Middle East and North Africa. The hackers silently carried out Man in the Middle Attacks to intercept all Internet data being sent to the victim organizations.


==ICANN Responses==
==ICANN Responses==