Twitter DNS Hack — Every Attack Leaves a Trace

| August 28, 2013

As has been widely publicized, yesterday, August 27,  a group claiming to be the Syrian Electronic Army (SEA) hacked into the MelbourneIT registrar and gained access to the registrar account of some very important clients including Twitter and the New York Times.  DomainTools got some free publicity out of that as the initial announcement by the perpetrators used a DomainTools Whois record screenshot as evidence of the compromise.  People (including many journalists) have been asking us what we know about the incident and, specifically, if the SEA did indeed get control of those domains.  So we wanted to clear a few things up.

As is clear now, MelbourneIT was hacked and they have admitted as such.  The whois records for several very well known media sites were altered, and repaired, intra-day yesterday.  Changing whois records indicates SEA gained some level of access at the registrar, but it doesn’t necessarily mean an intruder can execute more nefarious activity such as transferring the domain away or changing the nameservers.  Indeed, a number of the domains had registry lock provisions that prevented nameserver changes.  The bottom line is that the SEA had very real access to a number of valuable accounts at MelbourneIT, but the true risk depended on the levels of security implemented by the account holder at both the registrar and registry level.  It appears from the limited overall damage that the intent of this cyberattack was more for publicity  than anything else. Based on the significant media coverage of this event, it was quite successful at that.

DomainTools itself was not hacked.  Our whois service simply shows the exact whois record as returned by the registrar (or registry) at the time requested.  So those DomainTools whois records pictured in SEA’s tweet were the whois records at MelbourneIT and Versign at the time.   Users of our Whois History product will note that the stored records from yesterday appear accurate, not hacked.   This is because DomainTools’ Whois History data shows a maximum of one record per day (the last requested record), and the whois records of these domains were fixed intra-day yesterday.

We do, however, have  records of the intra-day changes in our database. They show that the whois records were indeed changed at one point yesterday afternoon to show the Tech Admin as SEA, in accordance with the picture in SEA’s tweet. We also have hacked records of and a number of other affected domains.

Switching gears a bit, it’s interesting to think about the investigation of who is behind these attacks.  This particular situation provides an interesting use-case for dealing with whois privacy.  An initial whois lookup of the domain will show an incomplete record, likely a result of poor registry policy enforcement in the Syrian TLD. Using our Whois History product, we see the domain has largely useless whois data since inception.  However, here are some interesting facts we surfaced:


  • Whois History shows the domain has only existed since April 29th of this year.
  • ReverseIP shows the IP address of that domain is associated with 2 other domains: and
  • IP Whois shows that IP address is hosted in Russia, not Syria.
  • Hosting History shows the original nameserver of, is different than the one today,   But is not under whois privacy protection.


Research like this can often be useful to surface interesting leads.  If one were to follow this trail, it would surface names, email addresses and other signals.  Most types of cyber attacks leave a trail of network information evidence. By this we mean domain name and IP address whois data and data which associates domain names, IP addresses and nameservers to each other and to individual people and organizations.  With this in mind, DomainTools has worked very hard to create the largest and most accurate database of DNS data available anywhere.

It remains our hope that ICANN sees fit to not only enforce whois accuracy, but keep the data in the public domain (no pun intended!) These events over the past 24 hours are yet another example of not only why registrar and registry security continues to be critically important, but also why whois and DNS data has real value and can provide powerful insight for security researchers and threat investigators.




Category: cyber attack, DNS Hack, Domain Industry, Domain Tools Updates

About the Author ()

DomainTools offers the most comprehensive searchable database of domain name registration (Whois), IP address and hosting data geared to investigate security attacks, cyber espionage, online fraud and all forms of cybercrime. DomainTools' web-based application enables users to pivot through 12 years historical records of Whois, hosting, DNS information and screenshots, the industry's broadest source of domain profiles including all ccTLDs, and IP address, hosting data, mail server records and more in order to find connections from unknown sources to known sources of badness. Customers and industry partners can integrate rich dataset into their IT Security solutions through DomainTools' APIs, including Parsed Whois API for structured data of current domain registration. DomainTools' customers include many companies within the Fortune 500, numerous global government agencies with cybercrime investigation units and many vendors in the security and online fraud investigation industries.

Comments (1)

Trackback URL | Comments RSS Feed

  1. anh doc says:

    Using I found really effective as a check of website information.
    However, there are many websites report inaccurate information owner’s name.
    This is not the responsibility of