Google among firms hit in Pakistan hack

Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attack

Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by a hack attack in Pakistan.

The attack, which exploited vulnerabilities in domain name systems (DNS) to redirect traffic, targeted sites with Pakistani domain names, such as, .pk and, according to the BBC.

Visitors to the targeted sites were redirected to a web page with a picture of two penguins walking across a bridge with the slogan "Pakistan Downed".

Although the attacks targeted websites, and not the networks of the companies involved, services such as Google's Gmail were temporarily unavailable in Pakistan.

The motive for the attack has not been confirmed, but some reports have speculated that it was aimed at highlighting weaknesses in the organisation that administers .pk web domains, known as PKNIC.

Technology blog ProPakistani said it had received an email from the hackers explaining how they carried out the attack.

The hackers claimed that PKNIC’s servers were vulnerable to Boolean-based blind SQL injection, time-based blind SQL injection, cross-site scripting (XSS) and “sensitive directory disclosure”.

Image: Thinkstock




Enjoy the benefits of CW+ membership, learn more and join.

Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...