Secunia recovers from DNS redirection hack
Serial scamp strikes again
Security notification firm Secunia has confirmed that a DNS redirection hack was to blame for the redirection of surfers to a hacker site on Thursday.
Secunia's authoritative DNS hosting was redirected for 70 minutes in the early hours of Thursday morning (Central European time). But because of the way DNS caching works, many surfers were still redirected to a defacement site hours after the Danish firm's definitive records were straightened out.
The attack resulted in a temporary redirection of traffic from all customers of registrar DirectNIC, not just Secunia. The hack was carried out by serial defacer TurkGuvenligi, who has used site-redirection techniques in previous attacks and seems to be motivated by bragging rights or pure mischief rather than anything more malign.
In a statement, Secunia was keen to stress that the redirection had no impact on any customer data it held from users of its patch management tools.
"The confidentiality of customer/end-user data in the Secunia solutions (including Secunia CSI and Secunia PSI) was not compromised during the incident," said Thomas Kristensen, CSO of Secunia. ®
Sponsored: Optimizing the hybrid cloud