Security Experts:

Hijacked Domain Hosted on IP Address Linked to Malicious Activity

The domain, which since 1997 had been serving articles about Perl programming, was hijacked last week.

Managed by The Perl Foundation, the site had David Farrell as editor, but received contributions for numerous Perl programming language enthusiasts, including Brian Foy, who also authored several books on Perl.

The Perl Foundation announced last week that the domain was hijacked, warning users to steer clear of, due to possible connections to sites associated with malware distribution.

“The domain was hijacked this morning, and is currently pointing to a parking site. […] We encourage you NOT to visit the domain, as there are some signals that it may be related to sites that have distributed malware in the past,” the announcement reads.

Users who might have selected as their CPAN mirror are advised to update their mirror in

While work is being done to recover the domain, Perl enthusiasts looking for articles on the programming language have been redirected to, which hosts the content previously present on the hijacked website.

The issue that led to the hijack, Foy explains, was “some snafu with the domain registration.” Because of that, an unknown party was able to register the domain for the next ten years.

Foy later said the incident apparently involved an "account hack" and it was not an isolated incident, with many other domains impacted.

Shortly after the domain was hijacked, The Register found it up for sale on (part of GoDaddy) for $190,000. The listing was pulled shortly after.

While can no longer be accessed over HTTPS, attempting to visit the HTTP version “sets a few tracking cookies, fetches some JavaScript, and renders as a blank page,” Sophos reveals.

The Google Cloud IP address that is now hosted at, namely 35.186.238[.]101, is known to have been used for malware distribution in the past, including for the Locky ransomware, but also as a command and control (C&C) server, BleepingComputer notes.

Although the domain doesn’t appear malicious for the time being, users should refrain from accessing until the original registrants are able to regain control of it.

*updated with information on possible account hack and other domains being affected

Related: Over 600 Microsoft Subdomains Can Be Hijacked: Researchers

Related: GitLab Patches Domain Hijacking Vulnerability

view counter