Home > Security > The Register Hacked (DNS Hijacked)

The Register Hacked (DNS Hijacked)

September 4, 2011

I can’t believe it.

I would never have thought that one of my favourite tech news sites could ever be hacked. Yet a few minutes ago I captured the following screenshot when browsing.

Come on guys, what is going on?

The Register Hacked

The Register Hacked

*Updated – 10:00pm 4th September 2011

After further investigation, it seems that The Register’s website was not hacked as such, but rather the DNS for that domain has been hijacked.

The bad A record IP appears to be instead of which is a rackspace server where the register is hosted.

If you go to all-nettools.com and do a nameserver lookup you’ll see the register has the following nameservers now:

theregister.co.uk. 86129 IN NS ns4.yumurtakabugu.com.
theregister.co.uk. 86129 IN NS ns2.yumurtakabugu.com.
theregister.co.uk. 86129 IN NS ns1.yumurtakabugu.com.
theregister.co.uk. 86129 IN NS ns3.yumurtakabugu.com.

Which isn’t right.

It should probably look something like:

theregister.co.uk nameserver = ns1.theregister.co.uk
theregister.co.uk nameserver = ns2.theregister.co.uk
theregister.co.uk nameserver = ns3.theregister.co.uk
theregister.co.uk nameserver = ns4.theregister.co.uk
theregister.co.uk nameserver = ns5.theregister.co.uk
theregister.co.uk nameserver = ns6.theregister.co.uk

*Updated – 11:00pm 4th September 2011

It appears that ups.com has also been hacked.

ups.com Hacked

ups.com Hacked

*update again… Sites that have also been defaced include



betfair.com defaced

betfair.com defaced

vodafone.com defaced

vodafone.com defaced

telegraph.co.uk defaced

telegraph.co.uk defaced

*Updated – 7:15am 5th September 2011

The Guardian have interviewed the Turkish hackers that instigated the attack on the various high-profile websites. http://www.guardian.co.uk/technology/2011/sep/05/dns-hackers-telegraph-interview

*Updated – 8:10am 5th September 2011

The Register have now posted an article explaining a little about what happened.


About these ads
  1. Billy
    September 4, 2011 at 7:39 PM

    Omg that whas my favourite website, why would someone do that.
    I hope they get it all sorted out

    • September 5, 2011 at 2:51 PM

      DNS poses the biggest security risk to any organization

  2. Shaun Baruzi
    September 4, 2011 at 7:50 PM

    Just seen that as well! Will be interesting to read the editorial on Monday :-)


  3. Cornz
    September 4, 2011 at 7:58 PM

    Yep, noticed same thing, figured it was some joke… Seems not….
    Question is how….

  4. Cornz
    September 4, 2011 at 8:06 PM

    Thinks its only very recently happened also….

  5. Vulcan Tourist
    September 4, 2011 at 9:02 PM

    Looks like a jackass randomly targeting any old Web sites he can manage to compromise, for no other purpose than to get notoriety for himself. He took a kitchen-sink approach and these are the ones that went down the drain. There’s no obvious ethical or political agenda at work in breaching those wildly different sites.

  6. Kage
    September 4, 2011 at 9:06 PM

    I doubt the website it self was hacked, looks like some trickery with the DNS servers meaning you are actually being sent to a completely different website. Worst part is if they wanted to, they could just make their “fake” site look like the real thing, and steal user passwords and such without people ever knowing.

  7. September 4, 2011 at 9:25 PM

    …he stole my logo for my website, I paid to have that designed several years ago.. I hate hackers

  8. September 4, 2011 at 9:54 PM

    Appears to be a registration attack. According to Netcraft the site moved to BlueMile today, September 4, 2011. Other sites hosted there are mostly porn.

    Netblock Owner IP address OS Web Server Last changed
    Bluemile, Inc 226 N. 5th St Suite 300 Columbus OH US 43215 Linux Apache/2.2.17 Unix mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/ mod_perl/2.0.4 Perl/v5.8.8 4-Sep-2011


  9. kiall
    September 4, 2011 at 9:58 PM

    All these sites work fine for me, from Ireland.

    Is it more likely your ISP has had their recursive nameservers hacked? Or maybe a root server close to you?

    dig trace NS theregister.com is giving the correct results from Irish and UK servers.

  10. September 4, 2011 at 9:59 PM

    On top of this El Reg was running a version of Apache (2.2.16) vulnerable to CVE-2011-3192 which leaves it open to an effective DoS.

  11. Anon
    September 4, 2011 at 10:04 PM

    I fired off an e-mail to ipadmin@bluemilenetworks.com, who supposedly administrates the IP address block which contains the one that is being used to host the dummy site. Guess we will see if they can do anything, now.

  12. anonymous
    September 4, 2011 at 10:12 PM

    theregister.co.uk. 600 IN A
    theregister.co.uk. 600 IN NS ns1.theregister.co.uk.

    It loos fine from here. Perhaps the DNS problem is on your end?

    • Chris Woollard
      September 4, 2011 at 10:13 PM

      I am not the only one that has seen the issue.

      • anonymous
        September 4, 2011 at 10:18 PM

        Right. Perhaps the others are using the same cache-poisoned or compromised nameserver as you. But I assure you, theregister.co.uk is resolving fine and the website is up.

  13. September 4, 2011 at 10:12 PM

    You sure your nameserver/ISP/whatever, or even your computer, is hacked instead?

    • Chris Woollard
      September 4, 2011 at 10:18 PM

      I am not the only one that has seen the issue. Many others from various different ISP’s.

  14. Guest
    September 4, 2011 at 10:42 PM

    Fact is they all have the same registrar, which is ASCIO (http://www.ascio.com).

    Most likely it that was compromised, which would explain how the nameservers got changed… just my 2 cents…

  15. relliker
    September 4, 2011 at 10:44 PM

    I can’t even reach theregister. Site won’t load.

  16. anonymous
    September 4, 2011 at 10:47 PM

    My own recursing named nameserver resolves fine.
    dig theregister.co.uk. any @ # this works fine too. But:
    dig theregister.co.uk. any @ # ouch!

    theregister.co.uk. 37457 IN NS ns2.yumurtakabugu.com.
    theregister.co.uk. 37457 IN NS ns1.yumurtakabugu.com.
    theregister.co.uk. 1631 IN A is not actually a public nameserver, but it has been left open for a long time. Are you using it? If so, stop.

  17. September 5, 2011 at 6:10 AM

    So, it seems more like it’s a REGISTRAR that’s been hacked — not The Register.

  18. September 5, 2011 at 7:19 AM

    Domain name attacks like this can be done via social engineering, such as password recovery or actually tricking somebody at the DNS registrar to disclosing info. This has been around forever, albeit not a full system compromise but ugly as it takes a long time to clear up.

  19. September 5, 2011 at 7:32 AM

    Turkish hackers target theregister.co.uk perhaps political motive behind it. Site is now down.
    simply wordpressed

  20. Quad
    September 5, 2011 at 8:12 AM

    “Gel Babana” translates to “Come to your daddy”

  21. bob
    September 5, 2011 at 8:32 AM

    Guardian link is broken – you’ve got too many mentions of http at the start of the url.

    • Chris Woollard
      September 5, 2011 at 8:34 AM

      Thanks. I have now fixed that.

  22. anonymous
    September 5, 2011 at 5:49 PM


    So this was real, and as others have said, it was a compromise at the registrar, not at The Register. The probable reason why I did not see it: the co.uk parent domain changes had been reversed before I checked.

    This incident is a good example of why I recommend NOT using one’s ISP nameservers. The benefit of cache hits being slightly faster is offset by the TTL being, on average, half of what you would get by doing your own recursion to the authoritative NS. And then you get to share in the cache poisoning with all the other users.

    Yes, my recursive resolver could get a poisoned cache as well, but the window of opportunity for mischief is much smaller. And I can flush the cache if I suspect something is amiss.

  1. September 5, 2011 at 6:20 PM
Comments are closed.

Get every new post delivered to your Inbox.

%d bloggers like this: