{"id":10779,"date":"2024-11-14T08:55:53","date_gmt":"2024-11-14T16:55:53","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10779"},"modified":"2024-11-14T10:00:22","modified_gmt":"2024-11-14T18:00:22","slug":"dns-predators-hijack-domains-to-supply-their-attack-infrastructure","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/","title":{"rendered":"DNS Predators Hijack Domains to Supply their Attack Infrastructure"},"content":{"rendered":"<p>Hijacking domains using a \u2018Sitting Ducks attack\u2019 remains an underreported topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and the risk to organizations are much broader than initially reported.  <\/p>\n<p>Following our initial publication on Sitting Ducks, Infoblox Threat Intel delved deeper into this topic. The result is a new, eye-opening report estimating that over 1 million registered domains could be vulnerable. The report also explores the widespread use of the attack and how multiple actors leverage it to strengthen their malicious campaigns. <\/p>\n<h3>More evidence found on Sitting Ducks Attacks<\/h3>\n<p>During a Sitting Ducks attack, the malicious actor gains full control of the domain by taking over its DNS configurations. Cybercriminals have used this vector since 2018 to hijack tens of thousands of domain names. Victim domains include well-known brands, non-profits and government entities. Infoblox Threat Intel crafted a monitoring initiative after the initial paper on Sitting Ducks attacks was published in July 2024. The results are very sobering, as 800,000 vulnerable domains were identified, and about 70,000 of those were identified as hijacked. <\/p>\n<h3>Easy to execute for actors. Hard to detect for security teams<\/h3>\n<p>Sitting Ducks attacks are easy to execute. The attack takes advantage of misconfigurations in the DNS settings for a domain, specifically when the domain server points to the wrong authoritative name server. The configuration vulnerability, known as \u2018lame delegation,\u2019 is not recognized as an official CVE or by major security authorities like CISA. This lack of attention allows actors to continue flying under the radar.  <\/p>\n<p>The harm doesn\u2019t end there. Once a victim domain is compromised, it allows the actors to set up attack infrastructure capable of evading existing detections. The positive reputation of the hijacked domains enables them to be seen by security controls as safe or benign, which then allows users to connect to the compromised and weaponized site. The low technical entry barrier to execute Sitting Ducks attacks and the additional stealth in subsequent intrusion steps may attract many more cybercriminal groups, resulting in more attack instances. <\/p>\n<h3>Mining and Recycling Exploitable Domains<\/h3>\n<p>A common occurrence seen by Infoblox threat researchers is rotational hijacking. This means that a domain is hijacked by multiple actors over time. Threat actors often hunt exploitable service providers that offer free accounts, like DNS Made Easy as lending libraries, typically \u201cchecking out\u201d (hijacking) domains for 30 to 60 days. Researchers have also seen cases where actors hold the domain for an extended period. After the free account expires, the domain is then \u2018lost\u2019 by the first threat actor and either parked or claimed by another threat actor. <\/p>\n<h3>Vipers and Hawks Feasting on Sitting Ducks Attacks<\/h3>\n<p><span class=\"inline-image\"><img decoding=\"async\" style=\"float:left;margin-right: 30px;\" width=\"200px\" alt=\"Vipers and Hawks Feasting on Sitting Ducks Attacks\" class=\"blog-image\" src=\"\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-figure-1.jpg\"><\/p>\n<p><strong>Vacant Viper<\/strong><\/p>\n<p>Vacant Viper is one of the earliest known threat actors to exploit \u2018Sitting Ducks\u2019 and has hijacked an estimated 2,500 domains each year since December 2019. This actor uses hijacked domains to augment their malicious traffic distribution system (TDS) called 404TDS with the intention to run malicious spam operations, deliver porn, establish remote access trojan (RAT) C2s, and drop malware such as DarkGate and AsyncRAT. Vacant Viper does not hijack domains for a specific brand connection but instead for a set of domain resources that have high reputations and will not be blocked by security vendors. The newly published report lists examples of attack chains showing redirection techniques used both by the 404TDS and their affiliates, including how Vacant Viper uses hijacked domains in the 404TDS.<br \/>\n<\/span><\/p>\n<p><strong>Vextrio Viper<\/strong><\/p>\n<p>This actor has used hijacked domains as part of their massive TDS infrastructure since early 2020. Vextrio runs the largest known cybercriminal affiliate program, routing compromised web traffic to over 65 affiliate partners, some of whom have also stolen domains via \u2018Sitting Ducks\u2019 for their own malicious activities. Many of these affiliates use a Russian antibot service as a method to filter out bots and security researchers. The functionality of AntiBot includes the ability to set rules to block certain bot services or users based on their IP geolocation, user-agent, etc.<\/p>\n<h3>New actors Horrid Hawk and Hasty Hawk.<\/h3>\n<div class=\"inline-image\">\n<p><img decoding=\"async\" style=\"float:left;margin-right: 30px;\" alt=\"New actors Horrid Hawk and Hasty Hawk.\" width=\"200px\" class=\"blog-image\" src=\"\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-figure-2.jpg\"><\/p>\n<p>The animal designation of Hawks was given because the threat actors swoop in and hijack vulnerable domains, much like hawks dive down to snatch their prey. Infoblox has named several new actors thriving on hijacked domains.\n<\/p><\/div>\n<ul class=\"list-spacing\">\n<li><strong>Horrid Hawk<\/strong>: A DNS threat actor that has been hijacking domains and using them for investment fraud schemes since at least February 2023. This actor is interesting because they use hijacked domains in every step of their campaigns, crafting convincing lures containing non-existent government investment programs or summits. They embed the hijacked domains in short-lived Facebook ads targeting users in over 30 languages, spanning multiple continents.<\/li>\n<\/ul>\n<ul class=\"list-spacing\" style=\"clear:both;\">\n<li><strong>Hasty Hawk<\/strong>: Another threat actor discovered during our research into \u2018Sitting Ducks\u2019 hijackings. Since at least March 2022, Hasty Hawk has hijacked over 200 domains to operate widespread phishing campaigns that primarily spoof DHL shipping pages and fake donation sites to support Ukraine. The actor exploits many providers, often reconfiguring hijacked domains to host content on Russian IPs. Hasty Hawk uses Google ads and other means, such as spam messages, to distribute malicious content. They also use a TDS to route users to different webpages that vary in content and language depending on their geolocation and other user characteristics. Hasty Hawk switches some of their domains back and forth between various campaign themes.<\/li>\n<\/ul>\n<h3>Havoc for individuals and businesses<\/h3>\n<p>Sitting Ducks attacks make many victims. Here is a brief overview of who may be impacted by these attacks:<\/p>\n<ul class=\"list-spacing\">\n<li>Organizations or Businesses: The first victim group is the organizations or businesses that own the vulnerable domains. The hijacking impacts their brand and reputation once the compromised site hits the news. Recovering from these attacks can take a lot of time and expertise, often not readily available within the organization.<\/li>\n<li>Individuals: The second victim group is the individuals who step into the malicious content or infrastructure behind the trusted domains. One single unconscious action can result in malware downloads, credential theft or fraud, resulting in costly damages to the individual or organization to whom they belong.<\/li>\n<li>Security Teams: The last victim group is the thousands of security teams defending their organizations against the latest threats. Cybercriminals like Hawks or Vipers use thousands of trusted domains in their TDSs and attack infrastructure, reducing the efficacy of their security operations drastically. When combined with additional social engineering, Hawks or Vipers can mislead targeted users within an organization, install remote access tools, and bypass existing controls. The time and cost to recover from these incidents can reach into the millions.<\/li>\n<\/ul>\n<h3>How to defend against Hawks?<\/h3>\n<p>While Sitting Ducks attacks are relatively easy to perform and difficult to detect, they are also entirely preventable with correct configurations at the domain registrar and DNS providers. DNS misconfigurations are an oversight arising from many factors. Multiple parties can play a role fixing them: the domain holder owns their domain configurations, and both registrars and DNS providers can make these types of hijacks harder to perform or easier to remediate.<\/p>\n<h3>Read More in Our New Research Report<\/h3>\n<p>Infoblox Threat Intel experts created an extensive report intended for threat researchers and advanced security professionals. The report explains the details behind how Sitting Ducks attacks work and how to identify a compromised domain. We also explored in depth how Vipers and Hawks execute Sitting Ducks attacks to create an infrastructure resistant to security vendor detection. For detection and threat-hunting teams, we list multiple victim domains and indicators of activity. Lastly, we explain with comprehensive illustrations how to assess your risks for a Sitting Ducks attack.<\/p>\n<p>Protect your business against the latest DNS threats. <a href=\"https:\/\/insights.infoblox.com\/resources-research-report\/infoblox-research-report-dns-predators-attack-vipers-hawks-hijack-sitting-ducks-domains\" rel=\"noopener\" target=\"_blank\">Download this latest Infoblox Threat Intel research report now.<\/a><\/p>\n<style>\n.green {color: #00bd4d;}\n.code-format {\n    font-family: 'Courier New';\n}\ntable{\nfont-size: 16px;\nword-break: keep-all;\n}\n.list-spacing li{margin-bottom:20px}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">DNS Predators Hijack Domains<\/span> to Supply their Attack Infrastructure');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hijacking domains using a \u2018Sitting Ducks attack\u2019 remains an underreported topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and the risk to organizations are much broader than initially reported. Following our initial publication on Sitting Ducks, Infoblox Threat Intel [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":10783,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254,2],"tags":[30,930,1125,1126,902,307],"class_list":{"0":"post-10779","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"category-security","9":"tag-dns","10":"tag-cybercrime","11":"tag-domain-hijacking","12":"tag-detection-evasion","13":"tag-tds","14":"tag-phishing","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Multiple DNS Actors linked to Domain Hijacking | Infoblox<\/title>\n<meta name=\"description\" content=\"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multiple DNS Actors linked to Domain Hijacking | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-14T16:55:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-14T18:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Multiple DNS Actors linked to Domain Hijacking | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"DNS Predators Hijack Domains to Supply their Attack Infrastructure\",\"datePublished\":\"2024-11-14T16:55:53+00:00\",\"dateModified\":\"2024-11-14T18:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/\"},\"wordCount\":1278,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg\",\"keywords\":[\"DNS\",\"Cybercrime\",\"Domain Hijacking\",\"Detection Evasion\",\"TDS\",\"Phishing\"],\"articleSection\":[\"Infoblox Threat Intel\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/\",\"name\":\"Multiple DNS Actors linked to Domain Hijacking | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg\",\"datePublished\":\"2024-11-14T16:55:53+00:00\",\"dateModified\":\"2024-11-14T18:00:22+00:00\",\"description\":\"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Predators Hijack Domains to Supply their Attack Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Multiple DNS Actors linked to Domain Hijacking | Infoblox","description":"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Multiple DNS Actors linked to Domain Hijacking | Infoblox","og_description":"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/","og_site_name":"Infoblox Blog","article_published_time":"2024-11-14T16:55:53+00:00","article_modified_time":"2024-11-14T18:00:22+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Multiple DNS Actors linked to Domain Hijacking | Infoblox","twitter_description":"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"DNS Predators Hijack Domains to Supply their Attack Infrastructure","datePublished":"2024-11-14T16:55:53+00:00","dateModified":"2024-11-14T18:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/"},"wordCount":1278,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg","keywords":["DNS","Cybercrime","Domain Hijacking","Detection Evasion","TDS","Phishing"],"articleSection":["Infoblox Threat Intel","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/","name":"Multiple DNS Actors linked to Domain Hijacking | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg","datePublished":"2024-11-14T16:55:53+00:00","dateModified":"2024-11-14T18:00:22+00:00","description":"Learn how DNS threat actors hijack domains and use them in their malicious campaigns.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"DNS Predators Hijack Domains to Supply their Attack Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10779"}],"version-history":[{"count":19,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10779\/revisions"}],"predecessor-version":[{"id":10816,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10779\/revisions\/10816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/10783"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}