2nd Update: The root problem appears to be mitigated now. However, many DNS servers now have bad results cached. Please flush the cache of your recursive DNS servers.
Host names and IP addresses to watch:
ns1.yumurtakabugu.com. or 126.96.36.199
ns2.yumurtakabugu.com. or 188.8.131.52
ns3.yumurtakabugu.com. or 184.108.40.206
ns4.yumurtakabugu.com. or 220.127.116.11
IP Address used as A record for affected domains: 18.104.22.168
In particular IP addresses may change at any time. Please keep watching them and remove from blacklist as appropriate.
There have been several widespread defacements reported to us today. It appears their DNS name server entries all point to the same thing as seen below:
Here are a few examples of the sites so far:
The one commonality is they allappear to be all registered via ascio.com
More details as we learn more.
UPDATE: This IP is hosted by BlueMile. We have contacted themand they are aware of the situation and working on it.
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.