TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The Hijacking of Perl.com

298 pointsby leejoabout 4 years ago

25 comments

omega3about 4 years ago
I had a very hard time reading this article. It's filled with so many platitudes and truisms ("And, it always helps to have friends and good relationships with the people who are able to help.") and yet it doesn't really explain what happened. For all I know they might have forgotten to pay for the invoice.
评论 #26303106 未加载
评论 #26302671 未加载
评论 #26302584 未加载
评论 #26306734 未加载
评论 #26302588 未加载
评论 #26306612 未加载
评论 #26308221 未加载
评论 #26305226 未加载
mprovostabout 4 years ago
Wow I haven&#x27;t heard the name Tom Christiansen in years. I remember when he used to comment on Slashdot. This inspired me to find my slashdot login and dig up some of his old posts. I just discovered his amazing eulogy for Gary Gygax [0]. I never knew that Tom used to work at TSR (of D&amp;D fame) before becoming a programmer.<p>[0] <a href="https:&#x2F;&#x2F;slashdot.org&#x2F;comments.pl?sid=475216&amp;cid=22665150" rel="nofollow">https:&#x2F;&#x2F;slashdot.org&#x2F;comments.pl?sid=475216&amp;cid=22665150</a>
评论 #26301963 未加载
评论 #26302124 未加载
susamabout 4 years ago
A lot of domain name management runs on honour system. Here are two relevant stories regarding this:<p>- The Duct Tape Holding the Internet Together: <a href="https:&#x2F;&#x2F;medium.com&#x2F;thisiscala&#x2F;the-duct-tape-holding-the-internet-together-12118be60ff1" rel="nofollow">https:&#x2F;&#x2F;medium.com&#x2F;thisiscala&#x2F;the-duct-tape-holding-the-inte...</a><p>- Sinkholed: <a href="https:&#x2F;&#x2F;susam.in&#x2F;blog&#x2F;sinkholed&#x2F;" rel="nofollow">https:&#x2F;&#x2F;susam.in&#x2F;blog&#x2F;sinkholed&#x2F;</a><p>Disclosure: I am the author of the second story.
评论 #26301796 未加载
woodrowabout 4 years ago
If you own a high value domain, you should consider asking your registrar&#x2F;registry to turn on a registry lock [1] which protects you from compromises or social engineering at your domain registrar. It&#x27;s a little more expensive and can slow down NS delegation updates, but otherwise you run the risk of what happened here to perl.com, which can be extremely disruptive even if your attackers don&#x27;t try and resell the domain.<p>You can check the status of a domain by looking for &quot;Status: server{Delete,Transfer,Update}Prohibited&quot; in the whois response for that domain [2].<p>[1] <a href="https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2020&#x2F;01&#x2F;does-your-domain-have-a-registry-lock&#x2F;" rel="nofollow">https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2020&#x2F;01&#x2F;does-your-domain-have-a-...</a><p>[2] <a href="https:&#x2F;&#x2F;www.verisign.com&#x2F;en_US&#x2F;channel-resources&#x2F;domain-registry-products&#x2F;registry-lock&#x2F;index.xhtml" rel="nofollow">https:&#x2F;&#x2F;www.verisign.com&#x2F;en_US&#x2F;channel-resources&#x2F;domain-regi...</a>
评论 #26305327 未加载
brongondwanaabout 4 years ago
We nearly had something like this happen to Fastmail many years ago:<p><a href="https:&#x2F;&#x2F;fastmail.blog&#x2F;2014&#x2F;04&#x2F;10&#x2F;when-two-factor-authentication-is-not-enough&#x2F;" rel="nofollow">https:&#x2F;&#x2F;fastmail.blog&#x2F;2014&#x2F;04&#x2F;10&#x2F;when-two-factor-authenticat...</a><p>Scary stuff. Basically we had 24 hours to dispute via email when a fax was sent to our registrar with a faked up Australian company registration and a fake passport asking to remove 2FA and change the owner email to an address @qq.com.<p>At the same time, our hostmaster email address had been signed up to hundreds of non-double-opt-in mailing lists, so that there was lots of noise for this email to be lost in.<p>We had to fight very hard to be allowed to see the fax that was allegedly from us, so that we could see what they had done.
cfcf14about 4 years ago
Aside from the primary content regarding the hijacking the registrar, I really enjoyed reading about the methodological approach they adopted for tracking information and contacts during the crisis.<p>But to the primary content - I&#x27;ve been surprised at just how ad-hoc much of the internet backbone infrastructure is as I&#x27;ve learned more about it. The same could be said about the payments processing industry! Beneath all the complexity and sleekness underlying the tools we use every day seems to eventually lie a system of IOUs, with an honor-based resolution mechanism between sufficiently trustworthy entities.
评论 #26302475 未加载
评论 #26303076 未加载
hnarnabout 4 years ago
&gt; John Berryhill provided some forensic work in Twitter that showed the compromise actually happened in September. The domain was transferred to the BizCN registrar in December, but the nameservers were not changed.<p>Isn&#x27;t this preventable with &quot;clientTransferProhibited&quot;[1]?<p>&gt; This status indicates that it is not possible to transfer the domain name registration, which will help prevent unauthorized transfers resulting from hijacking and&#x2F;or fraud. If you do want to transfer your domain, you must first contact your registrar and request that they remove this status code.<p>If nothing else, you&#x27;d think that some simple monitoring would be warranted if you own an important domain, like checking the exit code of:<p># whois -h whois.verisign-grs.com google.com | grep &quot;Registrar: MarkMonitor, Inc.&quot;<p>[1]: <a href="https:&#x2F;&#x2F;www.icann.org&#x2F;resources&#x2F;pages&#x2F;epp-status-codes-2014-06-16-en#clientTransferProhibited" rel="nofollow">https:&#x2F;&#x2F;www.icann.org&#x2F;resources&#x2F;pages&#x2F;epp-status-codes-2014-...</a>
评论 #26302914 未加载
toast0about 4 years ago
&gt; We think that there was a social engineering attack on Network Solutions, including phony documents and so on. There’s no reason for Network Solutions to reveal anything to me (again, I’m not the injured party), but I did talk to other domain owners involved and this is the basic scheme they reported.<p>Look, if your domain is with Network Solutions, and you missed the other wakeup call[1] to get off of them; let this be the wakeup call.<p>Network Solutions was the right (only) choice for domains in the 90s, but it hasn&#x27;t been the right choice for domains in probably two decades.<p>[1] <a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;technology&#x2F;2013&#x2F;oct&#x2F;08&#x2F;whatsapp-avg-avira-anonymous-hacked-palestine" rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;technology&#x2F;2013&#x2F;oct&#x2F;08&#x2F;whatsapp-...</a>
ThePhysicistabout 4 years ago
Key-Systems GmbH seems like a legitimate business to me (judging by their website and company register data), seems they acquired the domain from the Chinese registrar to resell it. Still, seems hard to believe that you wouldn&#x27;t become suspicious when a Chinese company offers you a very popular domain name that seems to be in active use for sale.<p>That said I&#x27;ve seen registrars make some glaring mistakes in the past and many still rely on faxed documents to authorize domain transfers, so it&#x27;s not a surprise that stuff like this happens. Often, all it takes is finding out who&#x27;s the registrar (easy), obtaining a blank transfer authorization form from that registrar (easy again), obtaining the personal or company data of the domain owner (a bit more difficult but still doable), fill out the form and fax it in. Some providers won&#x27;t even bother to send you a notification when transferring the domain, so like here the legitimate owner won&#x27;t notice it&#x27;s gone before it&#x27;s way too late.
评论 #26302961 未加载
评论 #26301810 未加载
teddyhabout 4 years ago
This highlights a usefulness of not choosing the largest and&#x2F;or cheapest domain name registrar. I work at a small registrar, and we know all our customers and communicate with them directly. Social engineering attacks get harder in such an environment.
评论 #26301922 未加载
评论 #26301688 未加载
blfrabout 4 years ago
So what actually happened? Neither OP nor linked press articles seem to really explain it.<p>(There&#x27;s a joke somewhere in here about how readable Perl is.)
评论 #26302550 未加载
评论 #26303596 未加载
评论 #26310809 未加载
brabelabout 4 years ago
&gt; And, it always helps to have friends and good relationships with the people who are able to help.<p>It would be nice if, you know, people just did their jobs impartially regardless of whether they know or like you. But the reality is that not knowing the &quot;right people&quot; does indeed make things much harder, as we hear often here on HN from small businesses trying to deal with the tech giants.
评论 #26308119 未加载
评论 #26301985 未加载
iamricksabout 4 years ago
I had this same thing happen at my company, Godaddy somehow allowed someone to disable dual auth through social engineering and reset our password through a compromise email. They proceeded to initiate a domain transfer. Not sure how Godaddy would allow disabling dual auth over the phone.
k_szeabout 4 years ago
I’m surprised that the domain name ownership hasn’t been transferred to the Perl Foundation or something. Things might look ugly if Tom suddenly dies.
评论 #26303423 未加载
0xbadcafebeeabout 4 years ago
I literally shuddered when I read &quot;Perl NOC&quot;. It was like the ghost of a neckbearded BOFH breathed down my neck... On a serious note, I absolutely adore the simplicity of their blog (<a href="https:&#x2F;&#x2F;log.perl.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;log.perl.org&#x2F;</a>)
funkisjazzabout 4 years ago
A bit off topic, but I like the usage of &quot;social engineering attack&quot; instead of &quot;anything to do with the word computers&#x2F;cyber&#x2F;hacking&quot;, because it places the onus on the correct parties and the correct systems that failed.
psim1about 4 years ago
A slow heist by Chinese spammer&#x2F;scammers to use a popular domain name. This is clever and in direct contrast to the usual gobbling up of domains for spam&#x2F;scam purposes as soon as they expire at the peril of a forgetful owner.
评论 #26310011 未加载
评论 #26307311 未加载
ehwhyreallyabout 4 years ago
I did not read this, But a mate I used to work with was getting harassed by debt collectors, He looked up the DNS Records and the domain registrant email was set to another domain. admin@suchandsuch.com, Well turns out suchandsuch.com had expired.<p>He bought the domain, set up the email admin@suchandsuch.com and reset the debt collectors main domain by requesting a transfer to another domain provider, it then sent an email to the domain record holder and he took over their domain.<p>Never use the same domain or another domain for registrant emails and buy privacy. use a gmail or your isp provided email.
cturabout 4 years ago
That is an incredibly long winded way of saying very little.<p>Which is ironic as that is literally the opposite of the Perl programming language itself.
OliverJonesabout 4 years ago
Nice work, Perl.com team! And, a very helpful incident report we can all learn from.
emmelaichabout 4 years ago
The mentioned BizCN registrar has a very shady past according to a simple web search.
jrochkind1about 4 years ago
I don&#x27;t entirely understand how it was discovered. Was Perl.com pointing to something delivering content obviously not right for a while?
system2about 4 years ago
A very long article with no real information. Why did they even decide to publish this weird thing?
layoutIfNeededabout 4 years ago
Took me a while to figure out what this “Perl” was, so if you’re like me, I’m gonna save you some time: “Perl” seems to be the old name of the popular Raku language.
评论 #26301751 未加载
评论 #26301770 未加载
评论 #26301791 未加载
评论 #26303133 未加载
评论 #26301870 未加载
ArtTimeInvestorabout 4 years ago
What would solve the constant fear of losing important domains is making domains NFTs on the Ethereum blockchain.<p>This would make the situation better in two ways:<p>1: A normal domain move can only happen when the domain owner signs the transaction. If the domain owner claims to have lost their key, this would raise a red flag and result in an in-depth analysis which the domain owner has to pay.<p>2: The movement of the domain would be announced on the block chain. So in case the in-depth analysis has been tricked by an attacker, the righteous owner would be alarmed immediately. For this they would use some service that monitors the blockchain for them. They could then reverse the transaction with their key.
评论 #26302602 未加载
评论 #26302318 未加载
评论 #26308817 未加载
评论 #26302209 未加载