Security Experts:

Attackers Compromise Romanian Domains For Google, Yahoo in DNS Attack

Early Wednesday, unknown adversaries diverted traffic intended for the Romanian sites of Google and Yahoo to a defaced Web page.

As it turned out, the sites themselves had not been hacked. The attacker had managed to gain access to DNS servers and altered the DNS entries for domains including,,,,,, and to point to a different page in a DNS poisoning attack, Stefan Tanase, senior security researcher at Kaspersky Lab, wrote on the company's SecureList blog. Instead of going to the correct sites, Tanase determined that both and domains were resolving to a Dutch IP address.

Domain Name System servers act as a directory for the Web, translating domain names into the actual IP addresses of the servers so that users don't have to remember numeric codes. By changing the DNS entry, the attacker ensures that even though users are typing the correct domain name, they are diverted to a malicious site instead.

.PK Domains Hacked Via DNSWhile it's not known at this time how the attacker got access to the DNS entry, the cause is usually a weak or compromised password, or some kind of a vulnerability on the registrar's Website.

After scanning the .ro domains, researchers were able to determine that the only DNS entries that had been hijacked were Google's public DNS servers, and It appears the problem with domain was fixed around 8am Eastern time (13:00 GMT), according to the SecureList post.

DNS poisoning attacks have been frequently used by attackers. In September, visitors to Al-Jazeera were directed to a page denouncing the news network's coverage of the ongoing conflict between Syrian rebels and the government. Earlier this year, a group of hacktivists hijacked the DNS records for and made it seem as if the contents of the site had been wiped.

"All this could have been much worse if the attacker had other goals in his mind than just becoming famous by defacing famous websites. Imagine how many accounts could have been compromised this morning if these websites were redirected to a phishing page, instead of a defacement page," Tanase said.

These attacks follow other similar attacks that occurred over the weekend when attackers were able to compromise systems at Pakistani Domain Registrar PKNIC and poison the DNS records for Pakistani URLs maintained by Sony, Microsoft, Yahoo, PayPal, Fanta, Coke, Apple, HP, and Google.

Related Reading: Five DNS Threats You Should Protect Against

Related Reading: The Top Five Worst DNS Security Incidents

Related Reading: The Implementation Challenges for DNSSEC

Related Reading: Four Ways to Prepare Your Enterprise for DNSSEC

Related Reading: 5 Strategies for DNSSEC Key Management & Rollover

Related Reading: The Missing Ingredients for DNSSEC Success

view counter
Fahmida Y. Rashid is a Senior Contributing Writer for SecurityWeek. She has experience writing and reviewing security, core Internet infrastructure, open source, networking, and storage. Before setting out her journalism shingle, she spent nine years as a help-desk technician, software and Web application developer, network administrator, and technology consultant.