So? That doesn't mean anything, just that they filled in valid domains, nothing more.
Also note the modification date on the image above (7 Nov, 17:13).
And now:
Code:
[~]% dig microsoft.com phong:0:52
; <<>> DiG 9.4.2-P1 <<>> microsoft.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15757
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;microsoft.com. IN A
;; ANSWER SECTION:
microsoft.com. 2709 IN A 207.46.232.182
microsoft.com. 2709 IN A 207.46.197.32
;; Query time: 11 msec
;; SERVER: 194.109.6.66#53(194.109.6.66)
;; WHEN: Sat Nov 8 00:53:05 2008
;; MSG SIZE rcvd: 63
I'm pretty sure the whois data was somehow compromised, through `hacking' or otherwise ...