One of our researchers recently received a text from an unknown number saying they were eligible to receive a full refund for an Amazon order. The message contained a link to a URL on t[.]co, Twitter/X's link shortener. Clicking the link led to the domain 267536[.]cc, which hosted an Amazon phishing page.
From this lead, we were able to find many more domains hosting the same content. The actor registering the domains seems to like .cc, the country code TLD for the Cocos Islands.
Sample of the domains:
236564[.]cc
267536[.]cc
671624[.]cc
687127[.]cc
319632[.]cc
Any #DNS folks know if Authenticated DNS over TLS to Authoritative Servers (ADoT) is going anywhere? Doesn’t look like recent activity on the drafts since 2022
https://www.ietf.org/archive/id/draft-dickson-dprive-adot-auth-06.html
https://datatracker.ietf.org/doc/html/draft-hal-adot-operational-considerations-00.html
Le retour des annuaires papier :
https://nlnetlabs.nl/news/2025/Apr/01/phonebook-of-the-internet/
Anyone else see strange issues trying to lookup download.microsoft.com?
My DNS servers seem to mostly fail when looking that up. Though sometimes 1 of 4 dns servers can resolve it for a few minutes at a time.
Also noticed odd results occasionally when using 1.1.1.1 as the DNS server, but 8.8.8.8 seems to work all the time.
I also see the same issue if using IPv6 DNS servers.
Weird. So far I am blaming either MS or Akami.
And, finally, an application for AI in the DNS.... https://easydns.com/blog/2025/04/01/easydns-first-to-use-ai-to-answer-all-dns-queries/
this one will help sell printer cartridges!
#dns
This is adorable!
From our friends at #NLnetLabs ... get a bound version of the phone book of the Internet.
https://nlnetlabs.nl/news/2025/Apr/01/phonebook-of-the-internet/ #dns
In a world where things can feel topsy-turvy...we've decided to turn everything on its head today. Join the movement!
@bearstech Justement non, l'article dit bien que ce n'est pas toujours le #DNS.
Orrrr. Kann dieses #dns nicht einfach-mal (tm) funktionieren?
Seufz. Keine Ahnung, was ich jetzt schon wieder falsch mache.
𝐋𝐚𝐚𝐭𝐬𝐭𝐞 𝐩𝐥𝐚𝐚𝐭𝐬𝐞𝐧 𝐒𝐈𝐃𝐍 𝐓𝐞𝐜𝐡𝐓𝐚𝐥𝐤! Wees er snel bij voor een avond met 2 interessante sprekers: Rejo Zengers (Bits of Freedom) over de controversiële Europese verordening Chat Control en Willem Toorop (NLnet Labs) over het DNS-recordtype DELEG. Uiteraard is er ook ruimte voor vragen en discussie.
Meld je gratis aan en geniet van een gratis maaltijd vooraf en een borrel na afloop. https://www.meetup.com/sidn-techtalk/events/306568645/?utm_medium=referral&utm_campaign=share-btn_savedevents_share_modal&utm_source=link
#adminForge #Spenden Update März 2025
2.588,42 € erreicht!
Es sind 888,22 € in 82 Transaktionen hinzugekommen!!!
Vielen Dank an alle Unterstützer, macht weiter so
https://adminforge.de/unterstuetzen
#Ente https://erpel.cloud
#Pixelfed https://pixelshot.it
#PeerTube https://clip.place
#LinkStack https://linklist.me
#OpenTalk https://teamjoin.de
#DNS https://dnsforge.de
#Nextcloud https://my.adminforge.de
#Mastodon https://kanoa.de
#Matrix https://nope.chat
RFC 9726: Operational Considerations for Use of DNS in IoT Devices
Les objets connectés sont une source de risques de sécurité. Pour les limiter, le RFC 8250 normalisait le format #MUD, pour que le fournisseur du machin connecté documente les accès au réseau de l'objet. Dans un fichier MUD, les services avec lesquels l'objet communique sont indiqués par un nom de domaine. Le #DNS a quelques subtilités, décrites dans ce #RFC.
Exploring Domain Generation Algorithms (DGAs) in Malware
Domain Generation Algorithms (DGAs) enable malware to change its domain dynamically. Below is an article I wrote years ago, which explains the difference between seed based and dictionary based algorithms.
https://malwareandstuff.com/dgas-generating-domains-dynamically/
Upgraded all four of my pihole instances to v6. They’re working perfectly!
I love how a bunch of the “advanced” settings are now available from the UI. It makes initial set up so much easier.
Our Quad9 documentation is now also available in #Romanian (https://docs.quad9.net/ro/) thanks to the help of our friend, Toma Minea (https://www.linkedin.com/in/toma-minea-86900582/).
Access to domain registration data is neither timely nor uniform. In today's Interisle Insights post, Colin Strutt shares the challenges that law enforcement, first responders, and researchers face in collecting even the “non contact registration data” elements to identify where cybercriminals acquire resources for their attacks.
https://interisle.substack.com/p/limiting-access-to-domain-registration
This amazing, cursed, fun, terrifying, makes you sick if you've ever worked in networking and incredibly entertaining all at the same time:
https://1.6.0.0.8.0.0.b.e.d.0.a.2.ip6.arpa/@domi/statuses/01JQHWXY605XVPGY5MAXV30K5X
@DoctorBrodsky @woe2you @miah given #Quad9 bowed before the #Contentmafia and censored #DNS requests, I'll continue to recommend using #OpenNIC's Servers instead
94.103.153.176 & 2a02:990:219:1:ba:1337:cafe:3
as well as144.76.103.143 & 2a01:4f8:192:43a5::2
I merely retain quad9 on said list for archival purposes. I Yeeted #CloudFlare aka. #ClownFlare since they are a #RogueISP!