{"id":11133,"date":"2025-03-10T08:00:42","date_gmt":"2025-03-10T15:00:42","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=11133"},"modified":"2025-03-12T15:07:37","modified_gmt":"2025-03-12T22:07:37","slug":"how-scammers-hijack-major-brands","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/","title":{"rendered":"How scammers hijack major brands"},"content":{"rendered":"<h3>What Does the CDC Have to Do with the English Premier League?<\/h3>\n<p>&nbsp;<br \/>\n<img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/how-scammers-hijack-major-brands-figure-1.png\" alt=\"Picture 1: Search results for English Premier League soccer game\" \/><\/p>\n<p class=\"image-caption\">Picture 1: Search results for English Premier League soccer game<\/p>\n<p>If you\u2019re a fan of English Premier League soccer and didn\u2019t have an easy way to watch the Liverpool-Wolverhampton match on February 16, you may have run across the ads above. And the more observant among you may have wondered, \u201cWhy is the U.S. Center for Disease Control and Prevention (CDC) providing helpful hints on watching the match live?\u201d<\/p>\n<p>The short answer is that they weren\u2019t. The links above took you into a morass of malware and malicious content, including scam, scareware and fake dating sites. But why would the CDC\u2014the United States\u2019national public health agency\u2014do such a thing? Surely their remit hasn\u2019t changed that much!<\/p>\n<p>Of course it hasn\u2019t. But maybe the best question\u2014and the one nearest and dearest to our hearts\u2014is what this all has to do with DNS.<\/p>\n<p>That\u2019s what we\u2019ll look at in this article: how threat actors were able to capitalize on poor DNS hygiene by the CDC to make malicious content available under the auspices of a trusted organization.<\/p>\n<h3>A Primer on Embedded CDN Content<\/h3>\n<p>First, we need to look at how content from content delivery networks (CDNs) is accessed\u2014for example, how it\u2019s embedded in websites. Most big websites load lots of content from CDNs: It\u2019s how everything from graphics and videos to annoying ads are delivered quickly and efficiently to your browser.<\/p>\n<p>A common way to embed CDN content is to refer to it by a domain name in your namespace, which is an alias for a domain name in the CDN\u2019s namespace. <\/p>\n<p>A DNS lookup for <span class=\"code-format\"><strong>ahbazuretestapp.cdc.gov<\/strong><\/span> may give the below results:<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/how-scammers-hijack-major-brands-figure-2.png\" alt=\"Picture 2: DNS lookup for ahbazuretestapp.cdc.gov\" \/><\/p>\n<p class=\"image-caption\">Picture 2: DNS lookup for <span class=\"code-format\">ahbazuretestapp.cdc.gov<\/span><\/p>\n<p>It\u2019s a good guess that the domain name <span class=\"code-format\"><strong>ahbazuretestapp.cdc.gov<\/strong><\/span> represents a CDC Azure test app of some kind.<\/p>\n<ul class=\"list-spacing\">\n<li>The first CNAME record creates an alias from <span class=\"code-format\"><strong>ahbazuretestapp.cdc.gov<\/strong><\/span> (a domain name in the CDC\u2019s cdc.gov namespace) to a domain name in Microsoft\u2019s <span class=\"code-format\"><strong>azurewebsites.net<\/strong><\/span> domain. (Picture 3: Normal Situation)<\/li>\n<li>That, in turn, is an alias for another domain name in Microsoft\u2019s <span class=\"code-format\"><strong>windows.net<\/strong><\/span> domain, which is yet another alias for a domain name in <span class=\"code-format\"><strong>azure.com<\/strong><\/span>. (All the aliases after the CDC\u2019s support advanced load distribution; virtually all CDNs use a system like this.)<\/li>\n<\/ul>\n<h3>The Dangers of Poor DNS Hygiene<\/h3>\n<p>This is all well and good. Now let\u2019s say the CDC decommissions their Azure test app and stops paying Microsoft to host it (Picture 3: Decommissioning). Microsoft then removes the second CNAME record, linking the target of the old CDC alias to their CDN infrastructure. But the CDC neglects to delete the old <span class=\"code-format\"><strong>ahbazuretestapp.cdc.gov<\/strong><\/span> CNAME record. <\/p>\n<p>A malicious actor can now use their account with the same CDN (Picture 3: Actor steps in) to create new content that uses the same domain name as the target of the CDC\u2019s alias, <span class=\"code-format\"><strong>ahbdotnetappwithsqldb.azurewebsites.net<\/strong><\/span>, thereby gaining control of the content that the CDC\u2019s alias points to. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/how-scammers-hijack-major-brands-figure-3-v3.png\" alt=\"Picture 3: Dangling CNAME Records: How actors abuse legit domains.\" \/><\/p>\n<p class=\"image-caption\">Picture 3: Dangling CNAME Records: How actors abuse legit domains. <\/p>\n<p>But wait\u2014this may not seem like a real security risk. After all, the CDC has presumably removed references to the Azure test app from their websites (or wherever). There\u2019s no way for an unassuming user to reach the malicious content! <\/p>\n<p>Indeed, but there is: <strong>Google and other search engines<\/strong> can still search and index the content and add it to their results (4). And that\u2019s exactly what those Liverpool and Wolverhampton fans saw. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/how-scammers-hijack-major-brands-figure-6-v2.png\" alt=\"Picture 4: Malicious content with high reputation CDC domain found by search engine.\" \/><\/p>\n<p class=\"image-caption\">Picture 4: Malicious content with high reputation CDC domain found by search engine. <\/p>\n<p>Why would our malicious actor bother? Because they want to capitalize on the reputation of the CDC. Results from an authoritative source like the CDC will naturally percolate to the top of a search engine\u2019s results. That means users are much more likely to access the malicious advertisements, and that much more likely to believe it\u2019s genuine. Our malicious actor is trading off the CDC\u2019s good name. <\/p>\n<p>There are several other ways for a malicious actor to abuse his control of the CDC\u2019s domain name. They could:<\/p>\n<ul class=\"list-spacing\">\n<li>Distribute malware from what appears to be the CDC<\/li>\n<li>Harvest the contents of web cookies for *.cdc.gov<\/li>\n<li>Get an SSL certificate for the domain name and gain access to secure cookies for *.cdc.gov<\/li>\n<li>Mount a phishing campaign from email addresses using the domain name<\/li>\n<\/ul>\n<h3>Who Is Our Malicious Actor?<\/h3>\n<p>It\u2019s natural to wonder who our malicious actor is. Clearly, it\u2019s someone\u2014or some organization\u2014clever enough to identify dangling CNAME records and to know how to exploit them.<\/p>\n<p>We visited many URLs that used these compromised domain names. Most led to malicious content delivered through a traffic distribution system (TDS) hiding the malicious advertiser\u2019s identity. We were asked to click \u201cAllow\u201d to watch a video, but instead of showing the video, we were redirected to a scam website offering scareware or a fake dating service, or in some cases distributing malware.<\/p>\n<div class=\"img-container-3-col\">\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/how-scammers-hijack-major-brands-figure-4a.png\" alt=\"Figure 5a\" \/><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/how-scammers-hijack-major-brands-figure-4b.png\" alt=\"Figure 5b\" \/><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/how-scammers-hijack-major-brands-figure-4c.png\" alt=\"Figure 5c\" \/>\n<\/div>\n<p class=\"image-caption\">Picture 5: Malicious content presented by the actor<\/p>\n<p>The TDS appears to be a Russian actor that advertises on the Dark Web. Not much is known about them. Interestingly, the malicious actor also seems to use <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/dns-predators-hijack-domains-to-supply-their-attack-infrastructure\/\"><strong>Sitting Ducks attacks, which we\u2019ve previously covered<\/strong><\/a>. <\/p>\n<h3>Protecting Yourself<\/h3>\n<p>The best way to safeguard against having your namespace fall victim to this vulnerability is to clean up those old CNAME records.<sup>1<\/sup> Deleting unused CNAME records eliminates the possibility of someone assuming control of the targets of those CNAME records and masquerading as your organization.<\/p>\n<p>Many of these unused CNAME records are dangling\u2014that is, they point to nonexistent domain names, at least until our malicious actor notices them and commandeers the target domain names for themselves. Fortunately, identifying dangling CNAME records is relatively straightforward:<\/p>\n<ul class=\"list-spacing\">\n<li>use Infoblox Universal Asset Insights\u2122 to gain comprehensive DNS visibility and insights across hybrid and multi-cloud environments.<\/li>\n<li>use a Microsoft script (found <a href=\"https:\/\/github.com\/Azure\/Azure-Network-Security\/tree\/master\/Cross Product\/DNS - Find Dangling DNS Records\" target=\"_blank\"><strong>here<\/strong><\/a>) to find dangling records.<\/li>\n<\/ul>\n<p>Equally important is preventing your users from visiting these compromised domain names. Since the malicious actors point these domain names to TDSs, Protective DNS is an ideal mechanism for blocking them. Infoblox provides threat feeds that enable your DNS infrastructure to block the resolution of domain names through TDSs and Infoblox Threat Defense\u2122 blocks their resolution in the cloud.<\/p>\n<p>To learn more about Infoblox Threat Intelligence Research visit <a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" target=\"_blank\"><strong>https:\/\/www.infoblox.com\/threat-intel\/<\/strong><\/a>.<\/p>\n<p>Request DNS Security Workshop<br \/>\n<a href=\"https:\/\/info.infoblox.com\/sec-ensecurityworkshop-20240901-registration.html\" target=\"_blank\"><strong>https:\/\/info.infoblox.com\/sec-ensecurityworkshop-20240901-registration.html<\/strong><\/a><\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li>We feel a little presumptuous telling the CDC how to protect themselves after relying so much on them for advice over the years, but this is DNS, not infectious disease.<\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.img-container, .img-container-3-col {\ndisplay: flex;\nflex-wrap: wrap;\njustify-content: space-between;\nheight: 100%;\n}\n.img-container img {\nwidth: 49%;\nmargin-bottom: 10px;\n}\n.img-container-3-col img {\nwidth: 30%;\nmargin-bottom: 10px;\nheight: inherit;\n}\n@media (max-width: 767px) {\n.img-container, .img-container-3-col {\ndisplay: block;\n}\n.img-container img, .img-container-3-col img {\nwidth: 100%;\n}\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('How scammers <span class=\"gradient\">hijack major brands<\/span>');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What Does the CDC Have to Do with the English Premier League? &nbsp; Picture 1: Search results for English Premier League soccer game If you\u2019re a fan of English Premier League soccer and didn\u2019t have an easy way to watch the Liverpool-Wolverhampton match on February 16, you may have run across the ads above. And [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":11141,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[1165,1166,1167,1168,1169],"class_list":{"0":"post-11133","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-dangling-dns-records","9":"tag-dns-hygiene","10":"tag-cname-records","11":"tag-domain-reputation-abuse","12":"tag-migrating-cdn-resources","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How actors abuse dangling DNS records<\/title>\n<meta name=\"description\" content=\"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How actors abuse dangling DNS records\" \/>\n<meta property=\"og:description\" content=\"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-10T15:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-12T22:07:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How actors abuse dangling DNS records\" \/>\n<meta name=\"twitter:description\" content=\"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"How scammers hijack major brands\",\"datePublished\":\"2025-03-10T15:00:42+00:00\",\"dateModified\":\"2025-03-12T22:07:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/\"},\"wordCount\":1133,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/how-scammers-hijack-major-brands-thumbnail.jpg\",\"keywords\":[\"Dangling DNS Records\",\"DNS Hygiene\",\"CNAME Records\",\"Domain reputation abuse\",\"Migrating CDN resources\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/\",\"name\":\"How actors abuse dangling DNS records\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/how-scammers-hijack-major-brands-thumbnail.jpg\",\"datePublished\":\"2025-03-10T15:00:42+00:00\",\"dateModified\":\"2025-03-12T22:07:37+00:00\",\"description\":\"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/how-scammers-hijack-major-brands-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/how-scammers-hijack-major-brands-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/how-scammers-hijack-major-brands\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How scammers hijack major brands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How actors abuse dangling DNS records","description":"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/","og_locale":"en_US","og_type":"article","og_title":"How actors abuse dangling DNS records","og_description":"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/","og_site_name":"Infoblox Blog","article_published_time":"2025-03-10T15:00:42+00:00","article_modified_time":"2025-03-12T22:07:37+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_title":"How actors abuse dangling DNS records","twitter_description":"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"How scammers hijack major brands","datePublished":"2025-03-10T15:00:42+00:00","dateModified":"2025-03-12T22:07:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/"},"wordCount":1133,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg","keywords":["Dangling DNS Records","DNS Hygiene","CNAME Records","Domain reputation abuse","Migrating CDN resources"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/","name":"How actors abuse dangling DNS records","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg","datePublished":"2025-03-10T15:00:42+00:00","dateModified":"2025-03-12T22:07:37+00:00","description":"Discover how poor DNS hygiene led to a cybersecurity breach involving the U.S. CDC and the English Premier League. Learn how threat actors exploited dangling CNAME records to distribute malware and other malicious content, and find out how to protect your organization from similar attacks.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-scammers-hijack-major-brands-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/how-scammers-hijack-major-brands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"How scammers hijack major brands"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=11133"}],"version-history":[{"count":23,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11133\/revisions"}],"predecessor-version":[{"id":11197,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11133\/revisions\/11197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/11141"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=11133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=11133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=11133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}