Google Malaysia gets Hacked by 1337 Hacker

google malaysia hacked

The NIC hacker hit domain registrar again and this time 1337 hacker hijack Google Malaysia official domains(www.google.com.my) with DNS poisoning attack. At the time of writing, Both of Google Malaysia official sites are defaced and showing the message left by the hackers.

Two days before, I wrote, If the domain registrar server or NIC of a country was hacked recently, there’s a decent chance it is hacked by Pakistani Hacker 1337. He proved it again.

Hacked Sites with Zone-h Mirrors:

  • www.google.com.my
  • www.google.my
  • http://www.zone-h.com/mirror/id/20957809
  • http://www.zone-h.com/mirror/id/20957806

See Also: Google Kenya & Google Burundi Hacked By 1337

Google Malaysia domains are defaced with DNS poisoning attack. The hackers managed to hack into MYNIC (Malaysia Network Information Centre) and changed the authoritative DNS records of the domain, to point the domain name to the madleets name server. Currently, Website whois records shows the following name servers.
Primary Name Server: b0x4.madleets.com
Secondary Name Server: b0x3.madleets.com

There is no specific reason mentioned by the hacker on the deface page. The hacker writes on the deface page,

“Struck by 1337! Google Malaysia STAMPED by PAKISTANI LEETS! We are TeaM MADLEETS! Pakistan Zindabad”

All NIC’s or domain registrars that has been hacked by the 1337 hacker can be found here.

Update:

MYNIC site issued a statement and confirmed the attack and that it had been resolved pending propagation across the internet:

We can confirm there was unauthorised redirection of www.google.com.my and www.google.my to another IP address by a group which called themselves TeaM MADLEETS.

The problem was alerted in the early morning and MYNIC Computer Security Incident Response Team (CSIRT) immediately started to resolve the issue. The domain name www.google.com.my has been restored to their correct information at 7.10 am today and www.google.my is still resolving.

46 thoughts on “Google Malaysia gets Hacked by 1337 Hacker

  1. Zindabad means long live Pakistan and Islam.

  2. They are muslim hackers to shut down abything to do with the Americans. Muslim and Islam have something agaist the Americans. Google is an American company.

  3. […] The attack appears to have been of the ‘DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  4. […] The attack appears to have been of the ‘DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  5. […] The attack appears to have been of the ‘DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  6. […] attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information […]

  7. […] The attack appears to have been of a DNS poisoning variety, in that a hacker gained entrance to a Malaysia Network Information Center and altered a DNS annals of Google’s site to Madleets-controlled servers. So no information appears to have been altered on Google’s servers during this time, as this is a route conflict of sorts. […]

  8. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  9. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  10. […] According to The Hackers Post, the incident is the latest in a long line of DNS poisoning attacks by Leet. […]

  11. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  12. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  13. […] According to The Hackers Post, the incident is the latest in a long line of DNS poisoning attacks by Leet. Google Malaysia was similarly exploited in July. […]

  14. […] Leet in a statement to TechCrunch. “We have no political intentions whatsoever.” According to The Hackers Post, the incident is the latest in a long line of DNS poisoning attacks by Leet. Google Malaysia was […]

  15. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  16. […] According to The Hackers Post, the incident is the latest in a long line of DNS poisoning attacks by Leet. Google Malaysia was similarly exploited in July. […]

  17. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  18. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  19. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  20. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  21. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  22. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  23. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  24. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  25. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  26. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  27. […] The Hackers Post همچنین اعتقاد دارد این حمله در واقع دنباله حمله‌های متعدد گروه Leet به […]

  28. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  29. […] attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information […]

  30. […] Google Malaysia domains were apparently hacked by a group named “Team Madleets”, website-the hacker post already forecasted that, it could be a DNS poisoning attack. Google domains of various countries already hit by DNS […]

  31. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  32. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  33. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  34. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  35. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  36. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  37. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  38. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  39. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  40. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  41. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  42. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  43. […] قصد و غرض سیاسی نیز نداشتیم.» وب‌سایت The Hackers Post همچنین اعتقاد دارد این حمله در واقع دنباله حمله‌های متعدد گروه Leet به […]

  44. Gems variety cyberspace

    especially few website pages that come about to be complete underneath, from our point of view are without doubt perfectly price trying out

  45. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

  46. […] The attack appears to have been of the DNS poisoning variety, in which a hacker gained access to the Malaysia Network Information Center and changed the DNS records of Google’s site to Madleets-controlled servers. So no information appears to have been changed on Google’s servers at this time, as this is a redirect attack of sorts. […]

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title="" rel=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>