DNS hijacking II - implication