Avast, Earthlink
Date: Thursday April 24 2008, @08:34PM
Topic: Laugh (or Cry)

Ryan Singel, writing for WiReD's Threat Level weblog (can we please go back to that term?), reports on yet another dubious innovation that's part typosquatting, part phishing:

[S]tarting in August 2006, Earthlink instead intercepts that Non-Existent Domain (NXDOMAIN) response and sends the IP address of ad-partner Barefruit's server as the answer. When the browser visits that page, the user sees a list of suggestions for what site the user might have actually wanted, along with a search box and Yahoo ads. The rub comes when a user is asking for a nonexistent subdomain of a real website, such as http://webmale.google.com, where the subdomain webmale doesn't exist.... In this case, the Earthlink/Barefruit ads appear in the browser....
It gets worse:
[S]ubdomains are only as secure as Barefruit's servers, which turned out to be not very secure at all. Barefruit neglected basic web programming techniques, making its servers vulnerable to a malicious JavaScript attack. That meant hackers could have crafted special links to unused subdomains of legitimate websites that, when visited, would serve any content the attacker wanted. The hacker could, for example, send spam e-mails to Earthlink subscribers with a link to a webpage on money.paypal.com. Visiting that link would take the victim to the hacker's site, and it would look as though they were on a real PayPal page.
Paul Vixie politely describes this as a "problem exacerbated by inappropriate monetization of certain DNS features." And if the Pentagon distorted GPS signals to bidders on a first-come, first-served basis—say, off the Somalian coast or in the Strait of Malacca—that would be "an inappropriate monetization of certain GPS features." Unfortunately, the problem isn't limited to Earthlink.

This discussion has been archived. No new comments can be posted.
Avast, Earthlink | Log in/Create an Account | Top | 4 comments | Search Discussion
Click this button to post a comment to this story
The options below will change how the comments display
Check box to change your default comment view
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
This trojan is widespread
by fnord (groy2kNO@SPAMyahoo.com) on Friday April 25 2008, @01:13AM (#16983)
User #2810 Info
If the likes of NetSol and GoDaddy are doing it [webpronews.com] it must be right, right? -g
[ Reply to This | Parent ]

This article comes from ICANNWatch

The URL for this story is: