Feeds

Mitnick site targeted in DNS attack on webhost

"Mantrained"

Protecting users from Firesheep and other Sidejacking attacks with SSL

A website belonging to security expert Kevin Mitnick was compromised after hackers managed to access a domain name server maintained by the site's webhost and redirect visitors to pages that displayed pornographic images.

It was the second time in the past few years that a security lapse at hostedhere.net has allowed hackers to redirect the site, Mitnick told The Register. At time of writing, domain name system records for Mitnick Security have been restored, but some users continue to see the fraudulent website because many DNS caches still show the incorrect information.

"It's a general pain in the ass for everybody around because my site was redirected and now this webhosting provider has to rebuild all their customer boxes," Mitnick said. "So they're not happy with the hours of work they're going to have to spend doing it."

At time of writing, hostedhere.net was not reachable and representatives were not available for comment.

The attack is the latest to take aim at a prominent security consultant. Last year, accounts belonging to three researchers were ransacked by malicious miscreants who appeared bent on using the stunts to embarrass their targets. In addition to exposing more than 2GB of emails, the attackers also sent explicit porn to the members of a Little League baseball team coached by one victim.

The people behind the attack on Mitnick's site caused it to be redirected to a site that also displayed porn. It showed several men engaging in sex and superimposed a photo that appeared to be of Mitnick. It carried a message that read "All aboard the mantrain."

The attackers never gained access to the server hosting Mitnick's site, and in any event, the site didn't contain customer lists or other sensitive information, said Mitnick, who became a professional security consultant after serving five years in prison on hacking charges filed in the mid 1990s.

Mitnick, whose books include The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers and The Art of Deception: Controlling the Human Element of Security, said he planned to switch hosting providers soon.

"They keep getting compromised," he said. "Maybe I'll move it over to Amazon or something and let them attack Amazon." ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.