Last Updated: 2011-09-05 08:40:22 UTC
by Lorna Hutcheson (Version: 4)
3rd Update: Update with more details of the incident from The Register itself: http://www.theregister.co.uk/2011/09/05/dns_hijack_service_updated/ (thanks Alex)
2nd Update: The root problem appears to be mitigated now. However, many DNS servers now have bad results cached. Please flush the cache of your recursive DNS servers.
Host names and IP addresses to watch:
ns1.yumurtakabugu.com. or 126.96.36.199
ns2.yumurtakabugu.com. or 188.8.131.52
ns3.yumurtakabugu.com. or 184.108.40.206
ns4.yumurtakabugu.com. or 220.127.116.11
IP Address used as A record for affected domains: 18.104.22.168
In particular IP addresses may change at any time. Please keep watching them and remove from blacklist as appropriate.
There have been several widespread defacements reported to us today. It appears their DNS name server entries all point to the same thing as seen below:
ups.com. 85621 IN NS ns1.yumurtakabugu.com.
ups.com. 85621 IN NS ns2.yumurtakabugu.com.
ups.com. 85621 IN NS ns4.yumurtakabugu.com.
ups.com. 85621 IN NS ns3.yumurtakabugu.com.
Here are a few examples of the sites so far:
The one commonality is they all appear to be all registered via ascio.com
More details as we learn more.
UPDATE: This IP is hosted by BlueMile. We have contacted them and they are aware of the situation and working on it.