Unless I'm mis-reading the domain history, this domain was (and is) DNSSEC signed and that did not prevent the takeover. The attackers move is to hi-jack the HTTP endpoints instead of DNS servers, get the cert through HTTP upload verification, and then MiTM.
Quote Tweet
Replying to @danielcormier and @campuscodi
Good question. With BGP hijack in progress, seems the hackers were able to obtain a valid TLS cert for developers.kakao.com, see crt.sh/?q=developers. (now revoked).
3
7
37



