Brian Olson writes "I read the article a few days ago and tested my Comcast connection for DNS hijacking and all was well. Just a little while ago I mis-typed a URL and new thing I know I'm at a Comcast search engine page. I immediately called to complain about what Comcast described as a "service" and they supposedly removed me from the list if victims. My first thought was to spam www.stophijackingmydnsqueries_comcast.com for a few days and see if that got their attention, but I'll wait to see if this "service" is actually removed.
Here's where it gets really interesting. So while capturing the traffic to get the above dns query packet, I couldn't help but lookup the response IP (22.214.171.124). I was shocked to discover that it was not a Comcast IP, since I was redirected to a Comcast search page (http://search2.comcast.com/)...but low and behold, an IP for "FAST Search & Transfer Inc." Who? Well, the organization doesn't have a webpage, nor any useful information in Google searches. Hmmmm...the only information I see is the netblock information:
RTechName: Hutchinson, James Henry
Really? Did Microsoft make some sort of backdoor deal with Comcast? I don't know...but it surely seems so to me! There's the info...maybe someone can do more with it than I."