April 15, 2013

DNS Poisoning Hits Kenya Google, MSN, Skype...

Ulysses Wang

The Websense® ThreatSeeker® Intelligence Cloud has detected that a DNS poisoning attack is happening in Kenya, with local big name websites in information technology targeted including Google, Bing, and LinkedIn. Although DNS records point to a page on behalf of the attackers that lets the browsing user know about the hack, it could easily be replaced with a malicious page at will.

Below is the snapshot in Websense ThreatSeeker Intelligence Cloud:

This is another attack issued by the so called Bangladeshi Hacker Group, the hacker group that has defaced 700,000 websites in the past and recently targeted prominent sites in Malawi (February 2013). In the Kenya campaign, from zone-h.com (a website tracking defaced websites), we could cross reference and confirm that the following well-known websites have been affected.


Websense customers are protected by our Advanced Classification Engine with real-time detection intelligence.

About Forcepoint

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.