試す 金 - 無料
DNS Hijack – Simplifying The Misroute
Enterprise IT World
|April 2019
DNS Hijacks are rapidly getting common and threat to e-commerce, corporates and end users. What exactly is a DNS hijack and how does that work and most importantly, how should we safeguard against this rapidly increasing threat.
The hackers behind DNSpionage succeeded in compromising key components of DNS infrastructure for more than 50 Middle Eastern companies and government agencies, including targets in Albania, Cyprus, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Saudi Arabia and the United Arab Emirates.
For example, the passive DNS data shows the attackers were able to hijack the DNS records for mail.gov.ae, which handles email for government offices of the United Arab Emirates. Here are just a few other interesting assets successfully compromised in this cyber espionage campaign: -nsa.gov.iq: the National Security Advisory of Iraq -webmail.mofa.gov.ae: email for the United Arab Emirates’ Ministry of Foreign Affairs -shish.gov.al: the State Intelligence Service of Albania -mail.mfa.gov.eg: mail server for Egypt’s Ministry of Foreign Affairs -mod.gov.eg: Egyptian Ministry of Defense -embassy.ly: Embassy of Libya -owa.e-albania.al: the Outlook Web Access portal for the e-government portal of Albania -mail.dgca.gov.kw: email server for Kuwait’s Civil Aviation Bureau-gid.gov.jo: Jordan’s General Intelligence Directorate
-adpvpn.adpolice.gov.ae: VPN service for the Abu Dhabi Police
-mail.asp.gov.al: email for Albanian State Police
-owa.gov.cy: MicrosoftOutlook Web Access for Government of Cyprus
-webmail.finance.gov.lb: email for Lebanon Ministry of Finance
-mail.petroleum.gov.eg: Egyptian Ministry of Petroleum
-mail.cyta.com.cy:Cyta telecommunications and Internet provider, Cyprus
-mail.mea.com.lb: email access for Middle East Airlines
WHAT EXACTLY IS A DNS?
The domain name system (DNS) functions as an interpreter between humans, who talk words, and computers, who talk numbers.
このストーリーは、Enterprise IT World の April 2019 版からのものです。
Magzter GOLD を購読すると、厳選された何千ものプレミアム記事や、10,000 以上の雑誌や新聞にアクセスできます。
すでに購読者ですか? サインイン
Enterprise IT World からのその他のストーリー
Enterprise IT World
INDIA-JAPAN SEMICONDUCTOR FORUM CHARTS PATH FOR TRUSTED GLOBAL COLLABORATION
SEMICON Japan 2025 sets the stage for resilient, sustainable, and competitive semiconductor value chains through bilateral cooperation.
1 mins
January 2026
Enterprise IT World
CYCOGNITO PREDICTS FIVE ATTACK-SURFACE TRENDS THAT WILL REDEFINE ENTERPRISE SECURITY IN 2026
AI-driven adversaries, regulatory complexity, and unmanaged assets will push organizations toward outcome-based cybersecurity strategies.
2 mins
January 2026
Enterprise IT World
FROM ENABLER TO ARCHITECT: HOW CIOS ARE DRIVING DIGITAL-FIRST TRANSFORMATION
Technology is no longer a support function it's the strategic engine powering growth and resilience. CIOs like Rajeev Pradhan are reimagining legacy systems, embedding responsible Al, and building cyber-secure frameworks to thrive amid disruption. His roadmap offers a blueprint for enterprises determined not just to adapt but to lead in a digital-first world.
9 mins
January 2026
Enterprise IT World
Exotel's Al-Driven Turnaround in FY25
Exotel has scripted a remarkable comeback in FY2024-25, transforming from an EBITDA loss of ₹31 crore in FY24 to a positive ₹34 crore in FY25.
1 min
January 2026
Enterprise IT World
HEALING WITHOUT HARM: BUILDING DATA PRIVACY INTO AI-POWERED HEALTHCARE
AI is transforming healthcare-from diagnostics to drug discovery-at an unprecedented scale. But innovation without trust is fragile. This story explores why embedding privacy into AI systems is not just a compliance requirement but a moral imperative for sustainable healthcare transformation.
2 mins
January 2026
Enterprise IT World
2026 WILL BE THE YEAR OF COGNITIVE THREATS: SEQRITE WARNS OF HUMAN-MIMICKING CYBERATTACKS
India Cyber Threat Report 2026 predicts Al-driven attacks that combine intelligence and automation, demanding a new era of cognitive resilience.
2 mins
January 2026
Enterprise IT World
WHY AI ALONE WON'T SAVE MALAYSIAN BUSINESSES FROM CYBERCRIME
AI is a powerful ally, not a lone savior. True cyber resilience demands human insight, layered defenses and continuous vigilance.
2 mins
January 2026
Enterprise IT World
CYBERCRIME'S NEXT FRONTIER: WHY 2026 COULD BE THE MOST DANGEROUS YEAR YET
From autonomous AI hackers to deepfakes and wearable data theft, experts warn that cyber threats are evolving faster than defences.
1 mins
January 2026
Enterprise IT World
2026: THE YEAR INTELLIGENT ENTERPRISES MOVE FROM ADOPTION TO ORCHESTRATION
Workforce readiness will become a C-suite survival metric. Enterprises that foster continuous learning and effective human-machine collaboration will gain a decisive edge.
1 mins
January 2026
Enterprise IT World
COFORGE BETS BIG ON AI: ACQUIRES ENCORA TO BUILD A US$2.5 BILLION ENGINEERING POWERHOUSE
The landmark deal positions Coforge as a global leader in Al-driven engineering, creating a scaled enterprise core of Al, Cloud, and Data services for the new era.
3 mins
January 2026
Translate
Change font size

