TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

LinkedIn suffers DNS hijack

210 pointsby mikegreenspanalmost 12 years ago

31 comments

fixxeralmost 12 years ago
I&#x27;m done with LinkedIn.<p>I&#x27;ve been on the fence about it for a year now. I get more recruiter spam than value.<p>I&#x27;m also a bit too old for the schadenfreude that accompanies news of my overpaid friends getting canned. I&#x27;m running my own race these days and I&#x27;ve never been happier since I stopped comparing my lot in life to the few lucky SOBs I know that survived the cull of sub-prime.<p>I think a better strategy is (1) your own domain and&#x2F;or (2) a site on github with actual code to validate* your talents.<p>*I hate those &quot;Joe Schmo supported you skill in [insert banal technical skill here]&quot; messages. I once put down C++ because I had been working with it for a couple years. Then, I thought better (I would not take a C++ programming job. Period. Hate that language.) and took it off. Next thing I know, I&#x27;ve got coworkers supporting my C++ acumen and LinkedIn trying to push it back on my profile. Ugh. I call that invasive feature creep.<p>On top of that, they seem to leave the backdoor open a bit too much for a company with $20b market cap.
评论 #5910575 未加载
评论 #5910181 未加载
评论 #5911500 未加载
评论 #5910864 未加载
kcenalmost 12 years ago
The DNS was not exactly hijacked, there were issues inside of LinkedIn&#x27;s top level DNS provider whom were delegating www.linkedin.com authorization to unauthorized nameservers, namely NS[SOMETHING].ztomy.com. The ztomy DNS replaces its delegated domains to point to a domain parking page if there is no record exiting. These changes were then propagated to other nameservers and thus to the end user. End result, dns doesn&#x27;t point where you think it does.
评论 #5909895 未加载
评论 #5909867 未加载
评论 #5910005 未加载
raldialmost 12 years ago
Can anyone think of a good reason LinkedIn didn&#x27;t mark their cookies as HTTPS-only?<p><a href="http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;HTTP_cookie#Secure_and_HttpOnly" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;HTTP_cookie#Secure_and_HttpOnly</a>
评论 #5910865 未加载
评论 #5909949 未加载
评论 #5910324 未加载
评论 #5909991 未加载
ChuckMcMalmost 12 years ago
Random anecdote:<p>One of the DNS issues I tried to fix with NIS+ was the &#x27;maintaining a list of trusted servers&#x27; problem by distributing the management of the authoritative servers. Trust was built bottom up, and authority came top down.<p>The way it worked was that clients used a &#x27;coldstart&#x27; file which was the (small number) of servers you trusted to provide your namespace lookups. You to their public key and you put it into your coldstart file. Similarly, a server put the key(s) of the servers it trusted above it in the name space in its coldstart file. And at company &#x27;root&#x27; level was a set of servers run by a trusted authority.<p>Locating the authoritative name server for x.y.z from p.q.z (same as DNS root is rightmost) client in x.y.z asks its server for a trusted y.z server, gets it, and asks that server for a trusted z. server, then asks that server for a q.z. server and finally for a p.q.z. server. Once this has happened once you know trusted servers can can jump to the nearest one to start resolving a new path in the namespace.<p>It was slower on initial lookup and then just as fast as DNS on later ones.<p>It had the downside that compromised (or borked) high level servers could send you on a different path to different root if the server above them was incorrect.<p>It is one of the more fun problems in the whole name&#x2F;directory service space.
评论 #5910357 未加载
hnolablealmost 12 years ago
I guess they didn&#x27;t mark their cookies as &#x27;Secure&#x27;. Oh well, the real story here is an app.net link at #1 on HN.
评论 #5909905 未加载
评论 #5909826 未加载
评论 #5911012 未加载
voidlogicalmost 12 years ago
<a href="http:&#x2F;&#x2F;confluence-networks.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;confluence-networks.com&#x2F;</a>:<p>Important Notice [20th June, 2013]<p>Confluence Networks is a Colocation &amp; Network service provider having tie-ups with data centers across various geographical regions. We don&#x27;t host any services ourselves. Starting few hours ago, we received reports about some sites (including linkedin.com) pointing to IPs allotted to our ranges. We are in touch with the affected parties &amp; our customer to identify the root cause of this event.<p>Note that it has already been verified that this issue was caused due to a human error and there was NO security related issue caused by the same. More details will be provided shortly.
nikcubalmost 12 years ago
This isn&#x27;t over yet - press dot linkedin.com (dont go there) is still pointing to the rogue server at 204.11.56.17<p>I&#x27;m trying to find other subdomains that might be still pointing there.<p>edit: i&#x27;m enumerating all the linkedin.com hosts using a dict. 80% of A records are returning the rogue IP 204.11<p>edit: 96 records still pointing at the rogue server, here is a dump I just uploaded:<p><a href="http:&#x2F;&#x2F;pastebin.com&#x2F;uc2JXPfB" rel="nofollow">http:&#x2F;&#x2F;pastebin.com&#x2F;uc2JXPfB</a>
评论 #5910287 未加载
merittalmost 12 years ago
Seeing 204.11.56.17 for their A record which is<p><pre><code> OrgName: Confluence Networks Inc OrgId: CN Address: 3rd Floor, Omar Hodge Building, Wickhams Address: Cay I, P.O. Box 362 City: Road Town StateProv: Tortola PostalCode: VG1110 Country: VG RegDate: 2011-04-07 Updated: 2011-07-05</code></pre>
评论 #5909794 未加载
评论 #5909873 未加载
bryanhalmost 12 years ago
Was api.linkedin.com compromised&#x2F;hijacked? If so, that means they&#x27;ll need to reset a lot of OAuth token&#x2F;secrets which will be very painful indeed (worse than just a site-wide session reset).
评论 #5910090 未加载
quackerhackeralmost 12 years ago
I think confluence-networks.com may be apart of Network Solutions (which is whom LinkedIn is registered with).<p>I had a domain (nitren.com), that I let expire after 3yrs and confluence-networks.com back ordered it, I remember looking it up a while back, but if I remember right, all the ip and domains were registered or associated with netsol.
评论 #5910500 未加载
ioquatixalmost 12 years ago
I&#x27;m going to blatantly advertise my own project &quot;RubyDNS&quot; - it can be a lot of fun, and it is especially relevant because it allows you to perform these kinds of attacks in a controlled environment. <a href="http:&#x2F;&#x2F;www.codeotaku.com&#x2F;projects&#x2F;rubydns&#x2F;index.en" rel="nofollow">http:&#x2F;&#x2F;www.codeotaku.com&#x2F;projects&#x2F;rubydns&#x2F;index.en</a>
评论 #5910013 未加载
mtamalmost 12 years ago
My traceroute is going thru prolexic.com so there might be something else at play here. &quot;Prolexic is the world’s largest and most trusted distributed denial of service (DDoS) mitigation service provider&quot;
thrownaway2424almost 12 years ago
I guess it&#x27;s a good thing I never reset my LinkedIn password after they lost them all, so I don&#x27;t have a LinkedIn account to be hijacked.
djabattalmost 12 years ago
DNS hacks on big public companies seems like a big security oversite form the linkedin team. wow.<p>Perhaps my HTTPS anywhere extension could have helped folks.
评论 #5910094 未加载
评论 #5910321 未加载
TheBurningOralmost 12 years ago
Does anyone have any corroboration of this?
评论 #5909833 未加载
评论 #5909790 未加载
shuwalmost 12 years ago
<a href="https:&#x2F;&#x2F;linkedin.com" rel="nofollow">https:&#x2F;&#x2F;linkedin.com</a> 301s to <a href="http:&#x2F;&#x2F;linkedin.com" rel="nofollow">http:&#x2F;&#x2F;linkedin.com</a> for me. Should I be suspicious or do browsers validate the certificate even during re-directs?
评论 #5910513 未加载
danyorkalmost 12 years ago
LinkedIn has posted a statement pointing over to &quot;the company that manages our domain&quot; - <a href="http:&#x2F;&#x2F;linkd.in&#x2F;12XMvpu" rel="nofollow">http:&#x2F;&#x2F;linkd.in&#x2F;12XMvpu</a>
Xanzaalmost 12 years ago
HTTPS everywhere; that&#x27;s all I have to say. Something like this is very malicious and very hard to detect -- unless you ALWAYS use SSL. I noticed right away that the DNS was incorrect.
NKCSSalmost 12 years ago
I just realised; If you opened a website with a linked in share button, your cookie might be compromised as well; you didn&#x27;t even have to go the the site while under the DNS Hijack...
sam152almost 12 years ago
Can someone examine the cookies that they set and tell if there is any sensitive information (passwords?) that are hashed in there? Should we consider this a password breach?
评论 #5910339 未加载
kylloalmost 12 years ago
Can they actually snarf cookies from other sites you&#x27;re logged into, or would they only be able to get at your LinkedIn session cookies?
评论 #5911929 未加载
willlllalmost 12 years ago
How has app.net adoption been going?
kcthotaalmost 12 years ago
fidelity.com is also not accessible. Currently traffic is routed to some domain parking page.
评论 #5910262 未加载
mattbarriealmost 12 years ago
Seems legit.<p>www.ztomy.com
评论 #5910021 未加载
lekealmost 12 years ago
Weren&#x27;t they asking for your email passwords the other day?
krappalmost 12 years ago
Someone turned off the &#x27;more magic&#x27; switch...
somid3almost 12 years ago
well, certainly the photo upload still is not working, you can update your photo via their website apparently.
mtamalmost 12 years ago
LinkedIn seems to be back online.
surjithctlyalmost 12 years ago
What a Hacking Idea. Seriously!
tomasienalmost 12 years ago
Watershed moment for ADN?
rsamvitalmost 12 years ago
Sigh. At least they didn&#x27;t leak plaintext passwords again
评论 #5910411 未加载
评论 #5910432 未加载