KDMS Team defaces more websites using DNS attacks

Share this article:

Hacktivist group KDMS Team took credit for compromising the website of security solutions company Rapid7 on Friday, as well as the site for its vulnerability and penetration testing framework Metasploit, posting pro-Palestine messages.

Rapid7 quickly issued a statement explaining the DNS settings for both websites were changed by a malicious third-party and the sites had to be locked down so the appropriate actions could be taken to address the issue.

“It looks like the domain was hijacked via a spoofed change request faxed to [domain registrar] Register.com,” the Rapid7 statement said.

KDMS Team made headlines earlier this week for using DNS redirection attacks to deface websites belonging to cross-platform instant messaging service WhatsApp, computer security firm AVG Technologies, and anti-virus software company Avira.

UPDATE:  Rapid7, in a statement, said that the attacker did not use a “spoofed change request fax” and and instead likely used other social engineering techniques to compromise the credentials of a Register.com employee.

Share this article:

Sign up to our newsletters

More in News

Cyber Command tests gov't collaboration in wake of attacks

The two-week exercise, "Cyber Guard 14-1," was completed this month.

Text message spammer settles charges filed by FTC

Text message spammer settles charges filed by FTC

Rishab Verma and his company agreed to settle charges filed by the FTC that Verma sent millions of spam text messages that deceitfully promised free merchandise.

Rhode Island hospital to pay $150K for past data breach

More than 12,000 patients' personal and health information was compromised in a breach at The Women & Infants Hospital of Rhode Island.