Hundreds of legitimate domains are victims of DNS poisoning

It’s shocking: hundreds – if not thousands – of domain names often have their DNS settings ‘poisoned’.

Hackers able to edit DNS zones create new third-level domains (subdomains), to be used for spamming and phishing.

An article detailing the practice lists a large number of such active examples, showing how viagra and other substance-peddling web sites go live after legitimate, active domains fall prey to DNS poisoning.

 

Copyright © 2024 DomainGang.com · All Rights Reserved.

Comments

6 Responses to “Hundreds of legitimate domains are victims of DNS poisoning”
  1. BUllS says:

    How about giving examples?

  2. Lucius "Guns" Fabrice says:

    How about clicking on that link? 😉

  3. Owen frager says:

    I get a malicious warning when I click on that link

  4. Lucius "Guns" Fabrice says:

    Good one Owen 🙂 It’s an .edu domain, no warnings on my end.

  5. BUllS says:

    It is a phishing link that will cause widespread virus attack

  6. Lucius "Guns" Fabrice says:

    Ok, jokes aside that’s where the article resides. I’m not pasting it here.

Leave a Reply

Your email address will not be published. Required fields are marked *

 characters available