Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Experts Discover 70,000 Hijacked Domains in Widespread “Sitting Duck” Attack Scheme
Global Security

Experts Discover 70,000 Hijacked Domains in Widespread “Sitting Duck” Attack Scheme

AdminBy AdminNovember 14, 2024No Comments5 Mins Read
Hijacked Domains
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Hacked domains

Several threat actors have been found to use a named attack method Ducks are sitting to hijack legitimate domains for use in phishing attacks and investment fraud schemes for years.

The findings Infoblox said that in the past three months, nearly 800,000 vulnerable registered domains were identified, of which approximately 9% (70,000) were compromised.

“Cybercriminals have used this vector since 2018 to hijack tens of thousands of domain names,” the cybersecurity company said in a report published on The Hacker News. “Affected domains include well-known brands, nonprofits, and government organizations.”

However, the attack vector is little known originally documented by security researcher Matthew Bryant back in 2016, did not attract much attention until the extent of the hijacking was made public in August of this year.

Cyber ​​security

“I think awareness has increased (since then),” Dr. Renee Burton, vice president of threat intelligence at Infoblox, told The Hacker News. “While we are not seeing a decrease in the number of hijackings, we are seeing that customers are very interested in this topic and appreciate being made aware of their potential risks.

A Sitting Ducks attack essentially allows an attacker to seize control of a domain by exploiting misconfigurations in the domain name system (DNS) settings. This includes scenarios where DNS points to an incorrect authoritative name server.

However, there are certain prerequisites for doing this: the registered domain delegates authoritative DNS services to a provider other than the domain registrar, the delegation is limpingand an attacker can “claim” a domain from a DNS provider and configure DNS records without accessing the owner’s valid account at the domain registrar.

Hacked domains

Sitting Ducks is easy to execute and stealthy, due in part to the positive reputation of many hacked domains. Some of the domains that have been attacked include an entertainment company, an IPTV service provider, a law firm, a supplier of orthopedic and cosmetic products, a Thai online clothing store, and a tire company.

Threat actors that hijack such domains take advantage of the rebranding and the fact that they are less likely to be flagged as malicious by security tools to achieve their strategic goals.

“It’s hard to detect because if a domain has been hijacked, it’s not lame,” Burton explained. “Without any other signs, such as a phishing page or piece of malware, the only telltale sign is a change in IP addresses.”

“The number of domains is so large that trying to use IP address changes to indicate malicious activity would result in a large number of false positives. We’ve gone ‘back’ to tracking threats that hijack domains by first understanding how they work individually and then tracking that behavior.”

An important aspect common to Sitting Ducks attacks is rotational takeover, where a single domain is taken over by different threat actors over time.

Hacked domains

“Threat actors often use service providers that offer free accounts, such as DNS Made Easy, as credit libraries, typically hijacking domains within 30 to 60 days; however, we have also seen other cases where entities have held a domain for an extended period of time,” Infoblox notes.

“After the short-term free account expires, the domain is ‘lost’ by the first threat actor and then either parked or taken by another threat actor.”

Some of the known DNS threat actors that have been found to be feasting on Sitting Ducks attacks are listed below –

  • Vacant Viper, who used it for 404 TDS operations, as well as malicious spam operations, porn delivery, command and control (C2) installation, and removal of malware such as DarkGate and AsyncRAT (ongoing as of December 2019)
  • Horrid Hawk, who used it to run investment fraud schemes by distributing hijacked domains through short-lived Facebook ads (running since at least February 2023)
  • Hasty Hawk, who used it to run widespread phishing campaigns that mainly impersonate DHL shipping pages and fake donation sites that impersonate supportukrainenow(.)org and claim to support Ukraine (running since at least March 2022)
  • VexTrio Viperwho previously operated his TDS (ongoing from early 2020)
Cyber ​​security

Infoblox reports that a number of VexTrio Viper affiliates, such as GoRefresh, have also been involved in Sitting Ducks attacks to run fake pharmaceutical campaigns online, as well as gambling and dating scams.

“We have several entities that appear to be using domains for C2 malware where hijacking is sent through postal services,” Burton said. “While others use them to spread spam, these members configure their DNS just to receive mail.”

This suggests that attackers are using hijacked domains for a variety of reasons, putting both companies and individuals at risk of malware, credential theft, and fraud.

“We discovered several entities that seized domains and held them for an extended period of time, but we were unable to determine the purpose of the seizure,” Infoblox concluded. “These domains tend to be highly reputable and typically go unnoticed by security vendors, creating an environment where smart actors can deliver malware, commit rampant fraud, and spoof user credentials with impunity.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.