←back to thread

1369 points universesquid | 1 comments | | HN request time: 0.204s | source
Show context
andrewmcwatters ◴[] No.45169908[source]
@junon, if it makes you feel any better, I once had a Chinese hacking group target my router and hijack my DNS configuration specifically to make "amazon.com" point to 1:1 replica of the site just to steal my Amazon credentials.

There was no way to quickly visualize that the site was fake, because it was in fact, "actually" amazon.com.

Phishing sucks. Sorry to read about this.

Edit: To other readers, yes, the exploit failed to use an additional TLS attack, which was how I noticed something was wrong. Otherwise, the site was identical. This was many years ago before browsers were as vocal as they are now about unsecured connections.

replies(5): >>45169946 #>>45169949 #>>45169952 #>>45169953 #>>45169958 #
littlecranky67 ◴[] No.45169953[source]
How did they get a valid ssl cert though?
replies(2): >>45170020 #>>45171864 #
1. klysm ◴[] No.45170020[source]
Could've been a while ago when SSL certs failures weren't as loud in the browser