This story is still breaking, but early indications are that:

1.  An attacker at AS10297 (or a customer thereof) announced several more
specific subsets of some Amazon DNS infrastructure prefixes:

205.251.192-.195.0/24 205.251.197.0/24 205.251.199.0/24

2.  It appears that AS10297 via peering arrangement with Google got
Google's infrastructure to buy (accept) the hijacked advertisements.

3.  It has been suggested that at least one of the any cast 8.8.8.8
resolvers performed resolutions of some zones via the hijacked targets.

It seems prudent for CAs to look into this deeper and scrutinize any domain
validations reliant in DNS from any of those ranges this morning.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to