DNS/NEWS/2015-11-13について、ここに記述してください。

1. scansafe.net issue

It's not clear that things have been repaired.

As of 17:00 PST 12 Nov (01:00 CUT 13 Nov), dig is still showing the suspect IP -- although with a 300 sec TTL (see below):

dig @ns4.mailround.com scansafe.net

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.4 <<>> @ns4.mailround.com scansafe.net
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 19078
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;scansafe.net. IN A
;; ANSWER SECTION:
scansafe.net. 300 IN A 208.91.197.132

;; Query time: 47 msec
;; SERVER: 208.91.197.132#53(208.91.197.132)
;; WHEN: Thu Nov 12 17:08:41 2015
;; MSG SIZE rcvd: 46

このひとは毒入りのサーバに問い合わせたらしい。

$ dig @208.91.197.132 scansafe.net
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 16462
;; Flags: qr aa rd; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 0

;; QUESTION SECTION:
;; scansafe.net.                IN      A

;; ANSWER SECTION:
scansafe.net.           300     IN      A       208.91.197.132

;; Received 46 B
;; Time 2015-11-14 00:14:08 JST
;; From 208.91.197.132@53(UDP) in 189.5 ms

2. 2015-11-14

-- ToshinoriMaeno 2015-11-13 15:10:28

$ dig @ns4.mailround.com scansafe.net
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 49903
;; Flags: qr aa rd; QUERY: 1; ANSWER: 1; AUTHORITY: 3; ADDITIONAL: 4

;; QUESTION SECTION:
;; scansafe.net.                IN      A

;; ANSWER SECTION:
scansafe.net.           3600    IN      A       80.254.145.119

;; AUTHORITY SECTION:
scansafe.net.           3600    IN      NS      ns4.mailround.com.
scansafe.net.           3600    IN      NS      ns5.mailround.com.
scansafe.net.           3600    IN      NS      ns0.mailround.com.

;; ADDITIONAL SECTION:
ns0.mailround.com.      3600    IN      A       80.254.145.110
ns0.mailround.com.      3600    IN      AAAA    2a00:9600:0:818:2::110
ns4.mailround.com.      3600    IN      A       72.37.171.85
ns5.mailround.com.      3600    IN      A       72.37.244.85

;; Received 189 B
;; Time 2015-11-14 00:09:06 JST
;; From 72.37.171.85@53(UDP) in 276.4 ms

3. ztomy.com

ztomy.com がからんでいそうなので、追いかけてみる。 (akamai上か)

http://blogs.cisco.com/security/hijacking-of-dns-records-from-network-solutions