Melbourneについて、ここに記述してください。
Domain registrar Melbourne IT at center of SEA meddling with New York Times, Twitter
Cory Von Wallenstein, the CTO of Dyn, which provides DNS services for Twitter but was not compromised in today’s incident, explained the attack as follows:
- For the affected sites, the attackers gained access to the domain registration accounts that were operated by Melbourne IT, and changed the authoritative DNS servers to ns1.syrianelectronicarmy.com and ns2.syrianelectronicarmy.com. What makes this attack so dangerous is what’s called the TTL… or time to live. Changes of this nature are globally cached on recursive DNS servers for typically 86,400 seconds, or a full day. Unless operators are able to purge caches, it can take an entire day (sometimes longer) for the effects to be reversed.
Twitter has posted the following update about what happened:
- At 20:49 UTC, our DNS provider experienced an issue in which it appears DNS records for various organizations were modified, including one of Twitter’s domains used for image serving, twimg.com. Viewing of images and photos was sporadically impacted. By 22:29 UTC, the original domain record for twimg.com was restored. No Twitter user information was affected by this incident.
Melbourne IT is now providing a statement, which we’ve pasted in below (h/t Matthew Keys)
The credentials of a Melbourne IT reseller (username and password) were used to access a reseller account on Melbourne IT’s systems.