Domain Name Structure Of Etisalat ‘Poisoned’
By Gulf News
Dubai: Traffic to telecom operator etisalat’s website was redirected to a Chinese website early on Thursday.
“Someone has managed to compromise the domain name structure (DNS) infrastructure of the internet. Technically it known as ‘DNS cache poisoning’ or ‘DNS spoofing’. He [the attacker] has managed to change the DNS records of etisalat’s website,” Nicolai Solling, director of technology services at help AG, a security solutions provider, told Gulf News.
He said that etisalat did not have vulnerability on its website but its domain name structure (DNS) was “poisoned”.
The attacker was able to update the DNS records associated with etisalat.ae. So, when a person logs on to etisalat’s website, it supplies false data to clients.
DNS is like a telecom book and it is a service that translates domain names (etisalat.ae) into IP addresses (192.168.1.101). The DNS server translates alphabets to numbers.
To perform a cache poisoning, Solling said the attacker exploits flaws in the DNS software.
Etisalat hasn’t given any official statement about the incident and did not answer Gulf News queries, but a customer care spokesperson said that the service is back to normal.
Even its payment service platform — e4me.ae — was showing an error message in the morning — “Gateway Timeout. The server did not receive a timely response from the upstream server.”