Virtual Event Today: Supply Chain Security Summit - Register Now

Security Experts:

Connect with us

Hi, what are you looking for?


Network Security

Attackers Hijack Craigslist Domain Name

[UPDATE] Users looking to visit online classifieds titan Craigslist on Sunday evening were redirected to a site hosted at the domain DigitalGangster(dot)Com, as a result of a DNS hijack.

[UPDATE] Users looking to visit online classifieds titan Craigslist on Sunday evening were redirected to a site hosted at the domain DigitalGangster(dot)Com, as a result of a DNS hijack.

Assumingly under a heavy load, the server receiving the hijacked traffic was unable to cope with the massive amount of web traffic that receives and was unable to respond to most web requests.

Not long after, the attacker(s) apparently changed some settings, and redirected requests for to the New York Times website, after going through a third party click through gateway, which could have been an affiliate link. Soon after that, requests reverted back to the Digital Gangster site, which at the time of publishing still appeared to be choking under heavy traffic.

DNS HijackDomain records indicate that the domain record was modified at 2014-11-24T00:32:41Z, with the domain name registrant listed as “steven wynhoff @LulzClerk”. (A Twitter search shows the account “@LulzClerk” as a suspended account.)

Related: DNS Hijack – How to Avoid Being a Victim

[UPDATE] – As of early Monday morning, the domain registration is back in control of the rightful Craigslist administrator, with the Name Servers also changed back servers. Users may need to clear their Browser Cache or Flush their DNS Cache to force the new settings to correctly resolve the DNS requests faster.

Craigslist CEO Jim Buckmaster posted an update on the incident early Monday, acknowledging that a “DNS outage” occurred as a result of a compromise:

“At approximately 5pm PST Sunday evening the craigslist domain name service (DNS) records maintained at one of our domain registrars were compromised, diverting users to various non-craigslist sites.

This issue has been corrected at the source, but many internet service providers (ISPs) cached the false DNS information for several hours, and some may still have incorrect information.

If you are unable to reach the craigslist site, please ask your network provider or tech staff to flush all * and * entries (A,CNAME,SOA) from their DNS servers.”

Attacks like this typically are not very complex, and rarely affect customer data.

These types of attacks typically do not utilize advanced hacking techniques to compromise servers or users’ systems via exploits or other means. In fact, attackers typically execute these attacks using simple phishing methods or other social engineering tactics that enable them to gain access to online accounts that control the domain name services.

DNS hijacking is also a favored attack method used by the Syrian Electronic Army (SEA), who managed to hijack domain names belonging to the New York Times and Twitter last year.

Related Reading:

 DNS Hijack – How to Avoid Being a Victim

Five DNS Threats You Should Protect Against

Are Your Domains Safe? Five Ways to Safeguard Your Domain Name and Website 

Network Solutions’ June “Snafu” – Why Heads Should Roll

 The Three Providers Who Decide Whether You Will Be Hacked

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...