Earlier today, Softpedia reported that an Algerian hacker using the nickname MCA-CRB has managed to deface the Romanian sites of Google (google.ro) and Yahoo! (yahoo.ro).
When we found out about this incident we were pretty skeptical of these websites being hacked. A website as large as Google can be hacked, in theory, but it’s highly unlikely. We then noticed that both domains resolve to an IP address located in the Netherlands: 18.104.22.168 (server1.joomlapartner.nl) – so it rather looks like a DNS poisoning attack.
The question which remains unanswered up until now is where exactly the DNS spoofing/poisoning attack has happened.There are several possible scenarios here:
All this could have been much worse if the attacker had other goals in his mind than just becoming famous by defacing famous websites. Imagine how many accounts could have been compromised this morning if these websites were redirected to a phishing page, instead of a defacement page.
At the moment, we are performing a wide zone scan for all .RO domains to determine the extent of this attack.
We will update the blogpost with new information as it becomes available.
UPDATE We have tested various DNS servers for the poisoning attack, and for the moment, the only ones which reply with the hijacked entry are 22.214.171.124 and 126.96.36.199 (Google's public DNS servers). We couldn't identify any other Romanian DNS server which exhibits this behavior.
UPDATE 2 You can test the DNS poisoning attack by yourself using dig: dig @188.8.131.52 google.ro or dig @184.108.40.206 google.ro
UPDATE 3 According to our monitoring, the Google DNS server(s) at 220.127.116.11 are no longer serving poisoned answers. The other Google DNS server(s) at 18.104.22.168 appear to still redirect users to the attacker's IP address. We are assuming that Google might be fixing the hijacked records as we are writing this.
UPDATE 4 It appears the problem with the Google.ro domain has been fixed around 13:00 GMT +2 (Romanian time) on both DNS servers (22.214.171.124 and 126.96.36.199). Other domains such as Paypal.ro are still not fixed.
UPDATE 5 After analyzing the latest evidence, it seems the most probable scenario for today’s DNS hijacking/poisoning incident is a compromise at RoTLD - The Romanian Top Level Domain Registry. Earlier this month, a similar incident took place at the Irish Domain Registry - IEDR. You can see IEDR’s statement here. RoTLD has not come out with a statement yet.
The full list of .RO domains affected by today's incident:
2012 Nov 28, 17:10
Most browsers and/or users have cookies for automatically login to google+ . My question is ..the hacker server didn't received also those cookies information from all those users ? This information can be used for login in google+ ?