KDMS Team defaces more websites using DNS attacks

Share this article:

Hacktivist group KDMS Team took credit for compromising the website of security solutions company Rapid7 on Friday, as well as the site for its vulnerability and penetration testing framework Metasploit, posting pro-Palestine messages.

Rapid7 quickly issued a statement explaining the DNS settings for both websites were changed by a malicious third-party and the sites had to be locked down so the appropriate actions could be taken to address the issue.

“It looks like the domain was hijacked via a spoofed change request faxed to [domain registrar] Register.com,” the Rapid7 statement said.

KDMS Team made headlines earlier this week for using DNS redirection attacks to deface websites belonging to cross-platform instant messaging service WhatsApp, computer security firm AVG Technologies, and anti-virus software company Avira.

UPDATE:  Rapid7, in a statement, said that the attacker did not use a “spoofed change request fax” and and instead likely used other social engineering techniques to compromise the credentials of a Register.com employee.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.