DNS Poisoning Hits One of China's Biggest ISPs 86
Support Code writes "ZDNet's Zero Day blog is reporting that a DNS server of one of China's largest ISPs has been poisoned to redirect typos to a malicious site rigged with drive-by exploits. The DNS poisoning attacks are affecting customers of China Netcom (CNC) and are using a malicious iFrame to launch exploits for known vulnerabilities in RealNetworks' RealPlayer, Adobe Flash Player and Microsoft Snapshot Viewer. In this interview with CNet, Dan Kaminsky confirms that attacks are definitely going on in the field."
Re:Frosty Post!!1 (Score:1, Funny)
I'd like to buy a vowel. A.
It's <iframe> (Score:5, Funny)
Real Player exploits? (Score:2, Funny)
Since when (Score:5, Funny)
Since when do I have to input my SSN to post to slashdot?
And what is M$ doing? (Score:2, Funny)
Re:Cyberparanoia (Score:5, Funny)
lol
Can we check the IP origin of that last post please?
*ring*ring*
Badguy1: "Hello"
Badguy2: "Hi its me, you ready to do this thing tonight?"
Badguy1: "sure, dont forget to bring the stuff"
*click*
Badguy2: "hey did you just hear a click on the line?"
Badguy1: "yeah! - do you think we are being tapped by the NSA?"
Anonymous Coward: "No its not our style"
Badguy1: "OK"
Badguy2: "OK"
Olympic DNS poisoning (Score:3, Funny)
Someone's decided to make DNS poisoning an Olympic sport. Obviously the only place to do it at the moment is China.
I've got images in my head of a broken toothed Chinese geek running around Beijing with an EEE PC and a Linksys wireless router hooked to a 12V SLA battery, lights a-blinking, instead of the Olympic torch. Thank goodness the Olympics are about to end.
iDon't Like It (Score:2, Funny)