Dell web address grabbed by a third party for a month

The address 'could have spread malware' to unsuspecting Dell customers

A web address used by Dell to help customers restore their data was taken over by a third party for a month last summer.

Security expert Brian Krebs learnt the site may have been hijacked for a month between mid-June and mid-July.

The backup and recovery program installed on Dell computers periodically checks a web address called A software backup and imaging company called SoftThinks, one of Dell's partners, previously had control of this address but it appears it forgot to renew the domain in mid-June.

Krebs wrote: "From early June to early July 2017 was the property of Dmitrii Vassilev of  "," a company listed in Germany that specializes in selling what appears to be typosquatting traffic. Team Internet also appears to be tied to a domain monetization business called ParkingCrew."

Advertisement - Article continues below

He added: "It could be that Team Internet did nothing untoward with the domain name, and that it just resold it or leased it to someone who did. But approximately two weeks after Dell's contractor lost control over the domain, the server it was hosted on started showing up in malware alerts."

This is according to Celedonio Albarran, who is vice president of IT infrastructure at Equity Residential. He reported that several of  his computers reached out to the web address but were prevented from making a connection, Krebs reported, because "the Internet address tied to the domain was new and because that address had been flagged by two security firms as pushing malicious software".

Advertisement - Article continues below

Albarran told KrebsOnSecurity that he found no evidence of any malware installed on his devices as a result of the traffic. However, he did say his systems were blocked from visiting the domains on 28 June 2017.

Advertisement - Article continues below

Krebs also pointed out that AlienVault's Open Threat Exchange lists the internet address that was assigned to the web address in June as an Amazon server which is "actively malicious", even today.

A spokesperson for Dell told IT Pro: "A domain as part of the cloud backup feature for the Dell Backup and Recovery (DBAR) application,, expired earlier in 2017 and was subsequently purchased by a third party. The domain reference in the DBAR application was not updated, so DBAR continued to reach out to the domain after it expired. Dell was alerted of this error and it was addressed.

"We do not believe that the Dell Backup and Recovery calls to the URL during the period in question resulted in the transfer of information to or from the site, including the transfer of malware to any user device."

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now



10 quick tips to identifying phishing emails

16 Mar 2020
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020

These are the companies offering free software during the coronavirus crisis

25 Mar 2020

Hackers target Three customers with "sophisticated" phishing scam

26 Mar 2020