Unfortunately this happened over the weekend when we all were down in Austin, TX for the Vacuum Club's convention. I had only one email alerting me to an issue and every time I checked site it appeared to be just fine. Being at the convention I didn't have much time for the website.
Over the weekend, our web host provider LunarPages has had its DNS (Domain Name Server) compromised, which resulted in a redirect nightmare for thousands of web site customers – including automaticwasher.org and vacuumland.org.
I feel for LunarPages. Honestly I do! They are one of the best, secure, shared web hosting companies that I’ve been affiliated with since our site went online in 2001. Fortunately this has never happened to us in the past, as far as I know.
The point is, however, there are no guarantees with the internet. Even if you are capable of running your own server and you know how to lock it down, you’re still vulnerable. That’s why we don’t run our own server. It’s too time consuming keeping up with these idiots!
So, in case you missed it, for a portion of time both aw.org and vacuumland were being redirected to a Swedish hosting provider.
We had it easy by comparison from what I’ve been reading on the support forum. Many sites had been redirected to malware providers that attempted to download an executable file. Others, have become victims of Cross-site Scripting attacks (XSS) and have no idea how to remove it from their pages. Many of these sites were using WordPress, Joomla, or other purchased software. The fact that I wrote our own customized code to run our discussion groups prevented the bad guys from injecting code into our site because its one of a kind and not off the shelf software that they could pre-analyze and exploit.
In order to understand what I said above (our web host provider LunarPages has had its Domain Name Server compromised), you have to understand that when you type in a web address, such as automaticwasher.org, there is a server on the Internet that takes that address and translates it into an IP address for the server it is located on. That server is called a DNS or Domain Name Server.
It’s sort of like a database that collects all the web addresses and connects them to their hosting server. So, when you type in an address in your browser, the address is sent to the DNS on your Internet Service Provider (ISP) and the browser then knows where to go look for the site.
Every so many hours – usually 24 – the ISPs flush their DNS cache. I know, huh????
Let’s look at it in another way.
Your computer – and I’ll use a Windows example – actually holds a storage or cache of the DNS addresses. That's how you’re able to get to websites so quickly. If you've ever gotten redirected or had problems accessing sites, you may have to flush or erase your computers DNS cache by typing in the run command the following: ipconfig /flushdns
That clears the stored – and possibly wrong – information on where websites are located. By flushing the information, your computer is forced to go out to the Internet and get a new list. Hopefully, the new list is corrected from errors you might have been experiencing.
ISPs need to do the same from time-to-time, and if they don’t, well, you wouldn’t be reading this because you’d be redirected to the Swedish hosting site.
Comcast appears to have flushed everything. Verizon apparently has not yet.
So, if you are reading this, your ISP has flushed the DNS cache and all is good.
I apologize about this, although there really was nothing Fred Nelson (webmaster of Vacuumland) or I could have done as this was an attack at the ISP level. Thus it is completely out of our hands.
[this post was last edited: 6/7/2010-18:14]