Thanks Matthew, I appreciate you bringing this to everyone's attention.

Unless I'm misunderstanding the scope of the attack, it would have been
trivial for them to get a trusted cert from most any CA. However, according
to the following article, "Victims had to click through a HTTPS error
message, as the fake MyEtherWallet.com was using an untrusted TLS/SSL
certificate.", yet the attackers still managed to steal millions of dollars
in alt-coins.

https://www.theregister.co.uk/2018/04/24/myetherwallet_dns_hijack/



On Tue, Apr 24, 2018 at 8:28 AM, Matthew Hardeman via dev-security-policy <
[email protected]> wrote:

> This story is still breaking, but early indications are that:
>
> 1.  An attacker at AS10297 (or a customer thereof) announced several more
> specific subsets of some Amazon DNS infrastructure prefixes:
>
> 205.251.192-.195.0/24 205.251.197.0/24 205.251.199.0/24
>
> 2.  It appears that AS10297 via peering arrangement with Google got
> Google's infrastructure to buy (accept) the hijacked advertisements.
>
> 3.  It has been suggested that at least one of the any cast 8.8.8.8
> resolvers performed resolutions of some zones via the hijacked targets.
>
> It seems prudent for CAs to look into this deeper and scrutinize any domain
> validations reliant in DNS from any of those ranges this morning.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to