Skip to content ↓ | Skip to navigation ↓


Imagine coming into the office one day, and finding that visitors to your website are not only seeing messages and images posted by hackers, but that the attackers are also posting screenshots of private emails sent to your company on Twitter.

That’s the scenario Lenovo faces todayalthough there is no evidence that the PC manufacturer’s own servers have been breached.

Boy, it can’t be a good time to be working at Lenovo at the momentwhat with the storm they created over the SSL-busting Superfish adware they preinstalled on some customers’ computers, and the consequent almost-inevitable class-action law suit.

So, how does a company’s website change like this in the blink of an eye, without your website being actually hacked?

Lenovo website - before and after hijacking

The thing is that your website doesn’t have to be hacked to fall under the control of hackers. Instead, all the hackers need to do is hijack your site, and they can do that by meddling with your Domain Name System (DNS) records.

DNS is the Internet’s phone book, translating website URLs that people remember (“”, “”, etc.) into numeric IP addresses (,, etc.) that the Internet understands.

You can’t remember your passwordsimagine having to remember the numeric address for all the websites you wanted to visit!

As security blogger Brian Krebs reports that Lenovo’s website was hijacked because Lizard Squad hackers were able to compromise Malaysian registrar, that looks after the DNS entries and some 600,000 other websites.

By altering the DNS entries for Lenovo, the hackers were able to redirect web traffic trying to visit to a web server under their control  which merrily displayed a slideshow of images, while playing a merry tune from “High School Musical” in the background.

But more than that, the attackers also altered the MX records for Those are the settings that define the location of the mail server, which will accept email on behalf of a particular domain.

In other words, the Lizard Squad hackers were now able to receive emails sent to, which they were quite happy to tweet about.

Email from PR company to Lenovo

In the hours following the attack, Lenovo issued the following statement:

Unfortunately, Lenovo has been the victim of a cyber attack. One effect of this attack was to redirect traffic from the Lenovo website. We are also actively investigating other aspects. We are responding and have already restored certain functionality to our public facing website.

We regret any inconvenience that our users may have if they are not able to access parts of our site at this time. We are actively reviewing our network security and will take appropriate steps to bolster our site and to protect the integrity of our users’ information and experience.

We are also working proactively with 3rd parties to address this attack and we will provide additional information as it becomes available.

It’s easy to pick on Lenovo at the moment, but no company should be fooled into thinking that they’re not also potentially a target for a similar attack. Even Google found out to its cost earlier this week that it could be plagued by similar mischief-making, after Lizard Squad disrupted the Google Vietnam site via a similar hijack.

DNS hijacking appears to be a growing threat, and is a technique not only used by the Lizard Squad hacking gang but also the Syrian Electronic Army and other online criminals.

The damage that can be done to a corporate brand through hackers hijacking your website’s DNS records are considerable, and many customers may assume that your own computers have been hacked.

Companies which wish to protect their websites, and indeed any emails that are being sent to them, need to ask their domain name registrar what steps they are taking to protect against such attacks.

For instance, the introduction of two-factor authentication and domain locking can help prevent unauthorised changes to DNS records and may deter hackers.

You can also ask registrars if they are implementing DNS Security Extensions (DNSSEC), which can increase a user’s trust that they are visiting the site that they intended.

Unfortunately, at the moment, many registrars are not providing DNSSEC, leaving it up to website owners to put their trust that registrars services don’t have vulnerabilities, and that other security practices (strong passwords and two-factor authentication) will be enough to protect their records from meddling by hackers.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc. If you are interesting in contributing to The State of Security, contact us here.



picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service  for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology.

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock

Tripwire University
  • Thank you for this good article. Unfortunately DNSSEC is being very little used by Registrars, and to my knowledge even going backwards lately. Good Registries provide DNSSEC, but the Registrars / hosting companies are (sadly) not dancing with us. What can we do to encourage them?

  • Paul Aleman

    had some really embarassing cyber issues,ran into some bad guys as well but my strong will to resolve my problems eventually paid off when i bumped into Aviv Nadav,he's the reason i believe in the whole hacking stuff and he's my personal hacker at the moment cuz we don't lose such important contacts.Professionalism,discretion and work rate is top class.hit him up at….You'd be amazed at what you'd experience.he's kinda picky though so make sure of the reference.Paul referred you.You're welcome.