{"id":11639,"date":"2025-05-20T08:10:37","date_gmt":"2025-05-20T15:10:37","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=11639"},"modified":"2025-05-29T08:29:11","modified_gmt":"2025-05-29T15:29:11","slug":"cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/","title":{"rendered":"Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor"},"content":{"rendered":"<h3>Authors: Jacques Portal, Ren\u00e9e Burton<\/h3>\n<p>&nbsp;<br \/>\n<span class=\"inline-image\"><img decoding=\"async\" style=\"float:left;margin-right: 15px;margin-bottom: 0px;\" width=\"180px\" alt=\"Hazy Hawk\" class=\"blog-image\" src=\"\/wp-content\/uploads\/infoblox-threat-actor-hazy-hawk-logo.png\"><\/span><\/p>\n<p>Hazy Hawk is a DNS-savvy threat actor that hijacks abandoned cloud resources of high-profile organizations. By \u201ccloud resources\u201d we mean things like S3 buckets and Azure endpoints. You might have read about domain hijacking; we and other security vendors have written about different techniques for grabbing control of forgotten domain names several times over the past year. While domain names can be hijacked through stolen accounts, we think the most interesting hijacks leverage DNS misconfigurations. Because DNS is not widely understood as a threat vector, these kinds of attacks can run undetected for long periods of time. At the same time, these attacks require a technical sophistication that isn\u2019t commonplace in the cybercriminal world. Hazy Hawk finds gaps in DNS records that are quite challenging to identify, and we believe they must have access to commercial passive DNS services to do so.<\/p>\n<p>The hijacked domains are used to host large numbers of URLs that send users to scams and malware by way of different traffic distribution systems (TDSs). This actor came to our attention after successfully gaining control of subdomains of the U.S. Center for Disease Control (CDC) in February 2025. Hundreds of URLs hosted on the CDC subdomain appeared suddenly and surfaced in search engine results, their result rankings buoyed by the credibility of the CDC. We soon realized that other government agencies across the globe, large universities, and international companies had been victimized by the same threat actor since at least December 2023. Figure 1 shows a simple view of Hazy Hawk operations. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/a-high-level-overview-of-how-hijacked-cloud-resource-domains-are-used-for-malicious-activities-by-hazy-hawk.png\" alt=\"Figure 1. A high-level overview of how hijacked cloud resource domains are used for malicious activities by Hazy Hawk\"><\/p>\n<p class=\"image-caption\">Figure 1. A high-level overview of how hijacked cloud resource domains are used for malicious activities by Hazy Hawk<\/p>\n<p>The discovery of vulnerable DNS records is a complex problem and indicates that Hazy Hawk has access to a large passive DNS service. These types of hijacks rely on misconfigured DNS records and can involve multiple DNS records in a chain that is not visible through normal internet probing. In addition, the integration of malicious push notifications in the attack chain acts as a force multiplier. <\/p>\n<p>Perhaps the most remarkable thing about Hazy Hawk is that these hard-to-discover, vulnerable domains with ties to esteemed organizations are not being used for espionage or \u201chighbrow\u201d cybercrime. Instead, they feed into the seedy underworld of adtech, whisking victims to a wide range of scams and fake applications, and using browser notifications to trigger processes that will have a lingering impact. Hazy Hawk is indicative of the lengths scam artists will go to get a portion of the multi-billion-dollar fraud market. In the senior population within the United States alone, citizens lose billions of dollars a year to the type of content Hazy Hawk delivers.<sup>1<\/sup><\/p>\n<p>Hazy Hawk uses layered defenses to protect their operations from discovery. By hijacking very reputable domains, they evade and hinder security analysis. Furthermore, Hazy Hawk uses code from legitimate websites to disguise their own content. The URLs typically redirect visitors through a second set of domains before entering a TDS for further routing. We found that a subdomain of the well-established <span class=\"code-format\">js[.]org<\/span> was used to deliver fake videos and games, for example, while in other cases Hazy Hawk appears to have set up the redirection site themselves.  <\/p>\n<h3>Backstory<\/h3>\n<p>Our discovery of Hazy Hawk starts with Brian Krebs. He alerted us that the CDC domain, <span class=\"code-format\">cdc[.]gov<\/span>, was suddenly hosting dozens of URLs that referenced porn videos. These could be seen in search engine results and carried the credentials of the CDC in the search metadata. In addition to pornography, there were also advertisements for a British football match (see Figure 2). Krebs initially thought that the CDC website had what is called an open relay, allowing traffic to freely redirect across their domain. But from our DNS perspective, it did not look that way.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/an-example-of-hazy-hawk-hijacked-domains-in-google-search-results-on-february-16-2025.png\" alt=\"Figure 2. An example of Hazy Hawk hijacked domains in Google search results on February 16, 2025 \"><\/p>\n<p class=\"image-caption\">Figure 2. An example of Hazy Hawk hijacked domains in Google search results on February 16, 2025 <\/p>\n<p>Why did we suspect DNS hijacking? All the URLs were on a strange subdomain of the primary domain, <span class=\"code-format\">ahbazuretestapp[.]cdc[.]gov<\/span>. This isn\u2019t the kind of subdomain a threat actor is likely to choose, so we checked for active CNAME records. It turned out that the subdomain was aliased to an Azure website. The Azure domain was the site of the hijack. Shown in Figure 3, DNS queries for <span class=\"code-format\">ahbazuretestapp[.]cdc[.]gov<\/span> will lead to <span class=\"code-format\">ahbdotnetappwithsqldb[.]azurewebsites[.]net.<\/span> <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/the-ip-resolution-chain-for-ahbazuretestappcdcgov-on-february-16-2025.png\" alt=\"Figure 3. The IP resolution chain for ahbazuretestapp[.]cdc[.]gov on February 16, 2025 \"><\/p>\n<p class=\"image-caption\">Figure 3. The IP resolution chain for ahbazuretestapp[.]cdc[.]gov on February 16, 2025 <\/p>\n<p>At this point, we were certain that the CDC had abandoned their Azure service, and that the hacker then found its corresponding, so-called dangling, DNS record. Hijacking was as easy as creating an Azure account and a site with the same name. But how does this all work?  <\/p>\n<h3>CNAME Hijacking<\/h3>\n<p>CNAME records are a type of DNS record that maps one domain name (the alias) to another (the CNAME). Very basically, it is a way for you to tell a resolver that, if someone wants to access <span class=\"code-format\">something[.]on-your-domain[.]com<\/span>, they can find it <span class=\"code-format\">somewhere[.]on-another-domain[.]com<\/span>. See Figures 4 and 5. These records are commonly used by content delivery networks (CDNs) to distribute large files you don\u2019t want to handle yourself.<sup>2<\/sup><\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/simplified-view-of-dns-cname-resolution.png\" alt=\"Figure 4. Simplified view of DNS CNAME resolution\"><\/p>\n<p class=\"image-caption\">Figure 4. Simplified view of DNS CNAME resolution <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/an-example-cname-chain-for-cloud-resources.png\" alt=\"Figure 5. An example CNAME chain for cloud resources\"><\/p>\n<p class=\"image-caption\">Figure 5. An example CNAME chain for cloud resources<\/p>\n<p>When a DNS CNAME record exists, but the resource it points to does not, the record is considered dangling. An attacker registers the missing resource to hijack the domain. Traditional dangling CNAME attacks take advantage of cases where the DNS record points to a domain that is not registered. The email security firm Guardio wrote about a threat actor who used this technique to imitate major brands in spam distribution.<sup>3<\/sup> In that case, for example, <span class=\"code-format\">marthastewart[.]msn[.]com<\/span> had a CNAME record pointing to <span class=\"code-format\">msnmarthastewartsweeps[.]com<\/span>. The latter domain had not been registered by MSN, but the DNS record had not been removed. By registering the abandoned domain, the spammer could send emails as MSN. For only a few dollars, the spammer gained a tremendous advantage. <\/p>\n<p>Domain hijacking sounds so easy: find a misconfigured DNS record, register a domain, and you are off to the races! But to hijack these domains, attackers first must find the dangling CNAME record. Even with free publicly available tools, effort and access to DNS data is required. For traditional CNAME hijacks, potential records can be checked by querying the alias domain to see if it is registered. A DNS response of NXDOMAIN is a telltale sign that the domain is ripe for hijacking. <\/p>\n<p>But Hazy Hawk is not a traditional hijacker, and hijacking cloud resources is not as easy as looking for an NXDOMAIN response. Identifying abandoned cloud resources is significantly more challenging than identifying unregistered domains. Every cloud provider handles missing resources differently. While a few providers will respond with an NXDOMAIN, most of them will respond with an IP address. Beyond that, there are even more challenges to isolating vulnerable DNS records. Some major cloud providers, like Azure, have implemented specific mechanisms to prevent hijacking even when a dangling record exists. <\/p>\n<p>We are not going to share methods to isolate exploitable CNAME records. Let\u2019s just say it requires extensive passive DNS access and ingenuity. Finding cloud resources susceptible to hijacking is significantly more labor intensive than finding lame name server delegations that are vulnerable to a Sitting Ducks attack.<sup>4<\/sup> Hazy Hawk and other cloud resource hijacking actors are likely doing significant manual work to validate vulnerable domains due to the various ways each cloud provider handles dropped resources. In contrast, through random sampling, we identify thousands of domains every day that might be susceptible to a Sitting Ducks attack, and tens of thousands of domains have been hijacked since 2020. <\/p>\n<h3>Hazy Hawk<\/h3>\n<p>So, let\u2019s talk Hazy Hawk. They are very good at finding abandoned cloud resources. We\u2019ve seen attacks against dozens of major organizations since at least December 2023.<sup>5<\/sup> They have commandeered domains (see the Indicators section for a full list) from:   <\/p>\n<ul>\n<li>Federal and regional government entities worldwide, such as <span class=\"code-format\">alabama[.]gov<\/span> and <span class=\"code-format\">health[.]gov[.]au<\/span>\n  <\/li>\n<li>Universities: <span class=\"code-format\">berkeley[.]edu<\/span> and <span class=\"code-format\">ucl[.]ac[.]uk<\/span>\n  <\/li>\n<li>Healthcare companies and organizations: <span class=\"code-format\">cdc[.]gov<\/span> and <span class=\"code-format\">dignityhealth[.]org<\/span>\n  <\/li>\n<li>Media and other large corporations: <span class=\"code-format\">deloitte[.]com<\/span>, <span class=\"code-format\">ey[.]com<\/span>, <span class=\"code-format\">pwc[.]com<\/span> and <span class=\"code-format\">ted[.]com<\/span>\n  <\/li>\n<\/ul>\n<p>Hazy Hawk has usurped resources on these services, and possibly others:  <\/p>\n<ul>\n<li>Akamai<\/li>\n<li>Amazon EC2, S3 and Elastic Beanstalk<\/li>\n<li>Azure (various cloud services)<\/li>\n<li>Bunny CDN<\/li>\n<li>Cloudflare CDN<\/li>\n<li>GitHub<\/li>\n<li>Netlify<\/li>\n<\/ul>\n<p>We use the name Hazy Hawk for this actor because of how they find and hijack cloud resources that have dangling DNS CNAME records and then use them in malicious URL distribution. It\u2019s possible that the domain hijacking component is provided as a service and is used by a group of actors. <\/p>\n<p>Hazy Hawk creates large numbers of URLs on the reputable resource. These URLs lead to a variety of scams and malware through affiliations with other actors. The first image in Figure 1 shows a high-level view of their operation. The URLs are cloaked\u2014meaning their true nature is hidden\u2014through the integration of sketchy adtech services. For example, visiting one of the CDC links led to a TDS operated by Adsterra. Navigating to the link from a VPN led to a webpage containing the text \u201canonymous proxy detected,\u201d while a residential IP address led through a maze of malicious content dependent on device and location. We captured examples of this rerouting behavior (see <a href=\"https:\/\/imgur.com\/a\/cdc-website-hijack-leads-to-malicious-adtech-XfguIcN\" target=\"_blank\"><strong>these screenshots<\/strong><\/a>), by clicking one of the URLs on an Android phone. <\/p>\n<p>Hazy Hawk uses layered defenses to disguise their activities, including:  <\/p>\n<ul>\n<li>Hijacking subdomains of highly popular, reputable domains connected to cloud resources<\/li>\n<li>Obfuscating URLs<\/li>\n<li>Using content from other reputable websites as a basis for their initial page<\/li>\n<li>Redirecting through at least one other URL using a well-known service<\/li>\n<li>Redirecting into a TDS designed to cloak the final landing page<\/li>\n<\/ul>\n<h3>URL Obfuscation<\/h3>\n<p>In certain cases, the malicious URLs are obfuscated to make it less obvious which cloud resource was hijacked. One way the threat actor does this is with URL redirection. For example, in January 2025, we saw Hazy Hawk exploit an open relay on the University of Bristol\u2019s website to redirect victims to the domain they hijacked: <span class=\"code-format\">agri-offers[.]michelin[.]co[.]uk<\/span>. See Figure 6. Abuse of open relays is not new; <a href=\"https:\/\/krebsonsecurity.com\/2016\/03\/spammers-abusing-trust-in-us-gov-domains\/\" target=\"_blank\"><strong>Brian Krebs documented<\/strong><\/a> their use by spam actors in 2016. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/hazy-hawk-hijacked-domains-using-url-redirection.png\" alt=\"Figure 6. Hazy Hawk hijacked domains using URL redirection\"><\/p>\n<p class=\"image-caption\">Figure 6. Hazy Hawk hijacked domains using URL redirection <\/p>\n<p>Another obfuscation trick they use is specific to AWS S3 buckets. Their malicious URLs are sometimes written in such a way that they do not directly refer to the hijacked resource name. For example, Hazy Hawk hijacked the S3 bucket <span class=\"code-format\">oercommons<\/span> in March 2025, but instead of using that domain name in the distributed scam URLs, like this:<\/p>\n<p><span class=\"code-format\"> Https[:]\/\/oercommons[.]s3[.]amazonaws[.]com\/&lt;params&gt; <\/span><\/p>\n<p>they used an alternate format like this:<br \/>\n<span class=\"code-format\"> Https[:]\/\/s3-ap-southeast-2[.]amazonaws[.]com\/oercommons\/&lt;params&gt; <\/span><\/p>\n<p>This format hides the bucket name and thwarts blocking based on the fully qualified domain name of the bucket. Clever! Figure 7 shows another example and includes other domains that were contacted while loading the URL.<sup>6<\/sup><\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/aws-subdomain-obfuscation-the-hijacked-bucket-name-is-hidden-in-the-url-path-httpsurlquerynetreport64ae0264-9f2a-4234-b8b6-8b8a8030a2f4.png\" alt=\"Figure 7. AWS subdomain obfuscation; the hijacked bucket name is hidden in the URL path https:\/\/urlquery.net\/report\/64ae0264-9f2a-4234-b8b6-8b8a8030a2f4 \"><\/p>\n<p class=\"image-caption\">Figure 7. AWS subdomain obfuscation; the hijacked bucket name is hidden in the URL path https:\/\/urlquery.net\/report\/64ae0264-9f2a-4234-b8b6-8b8a8030a2f4 <\/p>\n<h3>Stealing Legitimate Website Content<\/h3>\n<p>Hazy Hawk uses legitimate, often high-profile websites as the basis of their initial site content. They then modify the site to redirect to a second location. To a content crawler, the majority of the site will appear legitimate.  <\/p>\n<p>In some cases, they used a clone (pure copy of the HTML) of the page, such as the New York Times,<sup>7<\/sup> for their own main page. Although it might fool a content crawler (probably the goal) it won\u2019t fool real humans any time soon. We have seen Hazy Hawk do this for quite a few of the domains they have taken over, up until mid-February. It is unclear if they only did this for domain names they didn\u2019t think were valuable, or if they just did it to all of their domains up until that point, but this content cloning is not the best disguise. <\/p>\n<p>More recently, we\u2019ve seen them try a bit harder, and at least do a bit of research into the companies owning the domains they are hijacking. For example, when they hijacked a subdomain of <span class=\"code-format\">honeywell[.]com<\/span>, visiting it with a browser would land the user on a website that pretended to be Honeywell (the HTML was not a copy, but imitated the original Honeywell site). The admittedly simple website<sup>8<\/sup> talks about thermostats, smart home devices, and other things you might expect to find on a Honeywell domain.  <\/p>\n<p>Moving on from cloaking home pages, most of the webpages hosted on the hijacked domains use the same template and the same HTML headers. Hazy Hawk lures their victims with the promise of an enticing video (often pornography or pirated content). But, instead of building a video streaming website from scratch, Hazy Hawk just copied PBS. The website template they use is literally just a copy of <span class=\"code-format\">pbs[.]org<\/span>. They load the same libraries, the same stylesheets, and the same fonts, sometimes from <span class=\"code-format\">pbs[.]org<\/span> directly (shown above in Figure 7: AWS subdomain obfuscation). The one thing they do not appear to steal is PBS\u2019 video player, which might be surprising. But in reality, they don\u2019t need a video player: the \u201cvideos\u201d on their websites are just blurry pictures of videos with a play button in the middle.<\/p>\n<h3>Initial Redirection<\/h3>\n<p>The initial URL often redirects through a second domain. Sometimes the initial redirect itself is a hijack. That was the case when a French government website for the Olympic Games was commandeered in November 2024. Following the event, the site was taken down, but the DNS record was not removed. Hazy Hawk created URLs that redirected users to <span class=\"code-format\">https[:]\/\/share[.]js[.]org\/watch\/<\/span>, which served fake CAPTCHAs, requested permission to deliver notifications, and finally redirected users to the scam domain. If a user visited the URL from a VPN, they were blocked via TDS domains operated by an actor we track as Venal Viper.<sup>9<\/sup> <\/p>\n<p>So how did Hazy Hawk get access to <span class=\"code-format\">share[.]js[.]org<\/span>? It turns out, they stole that too. The domain <span class=\"code-format\">js[.]org<\/span> provides free webspace to JavaScript developers.<sup>10<\/sup> The developers use a subdomain of <span class=\"code-format\">js[.]org<\/span> to point to their GitHub repo.<sup>11<\/sup> An established Chinese developer, Jeff Tian, had claimed the \u201cshare\u201d subdomain six years ago, linking <span class=\"code-format\">share[.]js[.]org<\/span> to his WeShare tool.<sup>12<\/sup> Somehow Hazy Hawk gained control of the subdomain in November 2024 and began using it to redirect visitors from the French government website to scam content. When we asked Jeff about it, he said that he was alerted in January by the <span class=\"code-format\">js[.]org<\/span> maintainers that his page was serving \u201cSports-News powered by WordPress\u201d and not the original content.<sup>13<\/sup><\/p>\n<p>In many cases, the hijacked cloud domain redirects to a likely threat actor-controlled domain in Blogspot.<sup>14<\/sup> For example, the domain <span class=\"code-format\">chesta-korci-bro[.]blogspot[.]com<\/span> served as the first redirection for many of the CDC URLs and was first observed in passive DNS only a month earlier.<sup>15<\/sup> As of mid-April this Blogspot domain was still active and visiting individual blog entries would lead users into similar scams.<sup>16<\/sup><\/p>\n<p>In some instances, we have seen an intermediate redirection through one of several link shorteners, including the (formerly Twitter) URL shortening service t[.]co, TinyURL, Bitly, and Cuttly, before sending the user to the actor-controlled redirection site.<sup>17<\/sup> <\/p>\n<h3>Traffic Distribution Systems<\/h3>\n<p>Regardless of the first redirection, potential victims will typically be directed into a TDS, which will determine where they are sent next. The landing page is often unrelated to the initial lure. For example, the offer to watch high-profile sports matches may lead to security or gift card scams. A TDS is designed to maximize profits for the parties involved, connecting victims with the \u201ccontent\u201d they are most likely to \u201cbuy,\u201d while protecting the network from discovery by security vendors. This combination of profit and security motivations create dynamic circumstances where it can be hard to recreate a user\u2019s experience\u2014the first visit may lead to a scam and the second to an Amazon shopping page. <\/p>\n<p>Many of the Hazy Hawk URLs leveraging the hijacked <span class=\"code-format\">cdc[.]gov<\/span> subdomain redirected through an actor-controlled Blogspot page and then to <span class=\"code-format\">viralclipnow[.]xyz<\/span>. By sampling URL navigation paths that include this domain, we can get a view of how the TDS domains relate to the hijacked domains, initial redirects, and landing pages. The graphic in Figure 8 shows referrals and redirections of various URLs that connect to <span class=\"code-format\">viralclipnow[.]xyz<\/span>. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/a-partial-view-of-the-tds-connections-of-viralclipnowxyz-the-graph-shows-referrals-and-redirections-from-visiting-urls-hosted-on-a-number-of-primary-domains-including-cdcgov.png\" alt=\"Figure 8. A partial view of the TDS connections of viralclipnow[.]xyz; the graph shows referrals and redirections from visiting URLs hosted on a number of primary domains, including cdc[.]gov \"><\/p>\n<p class=\"image-caption\">Figure 8. A partial view of the TDS connections of <span class=\"code-format\">viralclipnow[.]xyz<\/span>; the graph shows referrals and redirections from visiting URLs hosted on a number of primary domains, including <span class=\"code-format\">cdc[.]gov<\/span><\/p>\n<p>Figure 9 below shows the portion of Figure 8 above that contains the <span class=\"code-format\">cdc[.]gov<\/span> domain. In it, we can see how Blogspot domains were used as intermediate redirects before landing at <span class=\"code-format\">viralclipnow[.]xyz<\/span> and other domains. The graph also shows some of the scam landing domains, including <span class=\"code-format\">clean-out[.]xyz<\/span> and <span class=\"code-format\">turbo-vpn-app[.]com<\/span>. Other domains shown there are part of the TDS. When the xyz Registry closed down <span class=\"code-format\">viralclipnow[.]xyz<\/span> in February, the threat actor moved to other domains.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/zoom-in-from-figure-8-partial-view-of-tds-containing-viralclipnowxyz-and-subdomains-of-cdcgov.png\" alt=\"Figure 9. (zoom in from Figure 8) Partial view of TDS containing viralclipnow[.]xyz and subdomains of cdc[.]gov\"><\/p>\n<p class=\"image-caption\">Figure 9. (zoom in from Figure 8) Partial view of TDS containing <span class=\"code-format\">viralclipnow[.]xyz<\/span> and subdomains of <span class=\"code-format\">cdc[.]gov<\/span><\/p>\n<h3>Push Notifications<\/h3>\n<p>Hazy Hawk is one of the dozens of threat actors we track within the advertising affiliate world. As we <strong><a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/pushed-down-the-rabbit-hole\/\">previously reported<\/a><\/strong>, threat actors who belong to affiliate advertising programs drive users into tailored malicious content and are incentivized to include requests to allow push notifications from \u201cwebsites\u201d along the redirection path. The victim who accepts these notifications, often through a trick by the actor, will be inundated with browser push notifications, each of which leads to a different scam. Programs for so-called push monetization can pay a 70-90 percent revenue share to the affiliate who gained the victim\u2019s approval. Push notifications essentially provide a persistence mechanism for the malicious adtech world to target a victim repeatedly. <\/p>\n<p>Several examples of the push notifications seen from the CDC hijack are shown in Figure 10, with more examples <strong><a href=\"https:\/\/imgur.com\/a\/cdc-website-hijack-leads-to-malicious-adtech-XfguIcN\" target=\"_blank\">here<\/a><\/strong>. The push notification services are run by different actors; we have seen residual push notifications from both RollerAds and the Russian underground operator, MoneyBadgers. While operators like Hazy Hawk are responsible for the initial lure, the user who clicks is led into a labyrinth of sketchy and outright malicious adtech. The fact that Hazy Hawk puts considerable effort into locating vulnerable domains and then using them for scam operations shows that these advertising affiliate programs are successful enough to pay well.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/push-notifications-following-a-visit-to-a-hazy-hawk-url-claimed-that-the-laptop-had-been-hacked-clicking-on-the-notification-led-to-tech-support-and-antivirus-scams-figure-1.png\" alt=\"Figure 10\"><br \/>\n<img style=\"width: 65%;\" decoding=\"async\" src=\"\/wp-content\/uploads\/push-notifications-following-a-visit-to-a-hazy-hawk-url-claimed-that-the-laptop-had-been-hacked-clicking-on-the-notification-led-to-tech-support-and-antivirus-scams-figure-2.png\" alt=\"Figure 10. Push notifications following a visit to a Hazy Hawk URL claimed that the laptop had been hacked; clicking on the notification led to tech support and antivirus scams \">\n<\/div>\n<p class=\"image-caption\">Figure 10. Push notifications following a visit to a Hazy Hawk URL claimed that the laptop had been hacked; clicking on the notification led to tech support and antivirus scams <\/p>\n<p>The U.S. Federal Bureau of Investigation\u2019s (FBI) statistics on the wide range of scams enabled by Hazy Hawk show that such crimes are rapidly increasing, particularly among the elder community.<sup>18<\/sup> In 2023, total losses reported for various fraud against people over 60 in the United States toppled $3.4 billion. Figure 11 shows those crimes by category. A remarkable number of them are the types we see Hazy Hawk conducting, along with other actors working in the affiliate advertising space. <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/losses-by-category-according-to-the-2023-elder-fraud-report.png\" alt=\"Figure 11. Losses by category according to the 2023 Elder Fraud Report \"><\/p>\n<p class=\"image-caption\">Figure 11. Losses by category according to the 2023 Elder Fraud Report<\/p>\n<h3>Prevention and Protection<\/h3>\n<p>There are two types of victims with Hazy Hawk activities: those whose domains are hijacked and the users who visit the malicious URLs. <\/p>\n<p>For domain owners, the best protection against Hazy Hawk and similar DNS hijacking threat actors is well-managed DNS. This can be difficult in complex, multi-national organizations where management of projects, domain registration, and DNS records may all be in separate organizations. These attacks are common after mergers and acquisitions. We recommend the establishment of processes that trigger a notification to remove a DNS CNAME record whenever a resource is shut down, as well as tracking active resources. <\/p>\n<p>The best way to shield end users from Hazy Hawk is through protective DNS solutions. Threat actors who work in the affiliate marketing space utilize TDSs to maximize their profits, and DNS is the optimal solution to disrupt all activity through these systems. When the threat intelligence used in a protective DNS product is designed to track and detect TDS actors, as Infoblox Threat Intel does, Hazy Hawk and others can change their domain names and still be thwarted. <\/p>\n<p>Education is a final component. Urge users to deny notification requests from websites they don\u2019t know. If they start receiving messages, unwanted notifications can be turned off in the browser settings. <\/p>\n<h3>Indicators<\/h3>\n<p>Malicious indicators are found in our <a href=\"https:\/\/github.com\/infobloxopen\/threat-intelligence\/blob\/main\/indicators\/csv\/hazy_hawk_20250520_iocs.csv\" target=\"_blank\"><strong>GitHub repository<\/strong><\/a>. Note that compromised domains are not included as they are legitimate.<\/p>\n<table>\n<tbody>\n<tr>\n<td class=\"code-format\">\n        acciona[.]com[.]au<br \/>\n        ademe[.]fr<br \/>\n        aha[.]org<br \/>\n        alabama[.]gov<br \/>\n        alaskaair[.]com<br \/>\n        angloamerican[.]com<br \/>\n        animalhumanesociety[.]org<br \/>\n        anker[.]com<br \/>\n        ariba[.]com<br \/>\n        arsenal[.]com<br \/>\n        auburn[.]edu<br \/>\n        bain[.]com<br \/>\n        barcelo[.]com<br \/>\n        barnardos[.]org[.]uk<br \/>\n        benesse[.]ne[.]jp<br \/>\n        berkeley[.]edu<br \/>\n        bluepoint[.]uk[.]com<br \/>\n        boomi[.]com<br \/>\n        bose[.]com<br \/>\n        bv[.]com<br \/>\n        byu[.]edu<br \/>\n        ca[.]gov<br \/>\n        campuslabs[.]com<br \/>\n        capgemini[.]com<br \/>\n        carrefour[.]fr<br \/>\n        carto[.]com<br \/>\n        cbre[.]com<br \/>\n        ccsu[.]edu<br \/>\n        cdc[.]gov<br \/>\n        chicagotribune[.]com<br \/>\n        christianpost[.]com<br \/>\n        civilservice[.]gov[.]uk<br \/>\n        claytargetsports[.]com<br \/>\n        cmsg[.]uk[.]com<br \/>\n        colorado[.]edu<br \/>\n        commscope[.]com<br \/>\n        communitycare[.]co[.]uk<br \/>\n        deloitte[.]com<br \/>\n        dignityhealth[.]org<br \/>\n        discoverhongkong[.]com<br \/>\n        dosomething[.]org<br \/>\n        education[.]vic[.]gov[.]au<br \/>\n        emerson[.]com<br \/>\n        eset[.]com<br \/>\n        ey[.]com\n      <\/td>\n<td class=\"code-format\">\n        fcagroup[.]com<br \/>\n        fnsb[.]gov<br \/>\n        foxtel[.]com[.]au<br \/>\n        fuller[.]edu<br \/>\n        fwc[.]gov[.]au<br \/>\n        gavi[.]org<br \/>\n        ge[.]com<br \/>\n        go[.]com<br \/>\n        gouv[.]qc[.]ca<br \/>\n        gov[.]on[.]ca<br \/>\n        grapecity[.]com<br \/>\n        gsk[.]com<br \/>\n        health[.]gov[.]au<br \/>\n        hktdc[.]com<br \/>\n        honeywell[.]com<br \/>\n        humana[.]com<br \/>\n        iaea[.]org<br \/>\n        illinois[.]edu<br \/>\n        ine[.]mx<br \/>\n        intel[.]com<br \/>\n        investmentsandwealth[.]org<br \/>\n        jameshardie[.]eu<br \/>\n        jameshardie[.]it<br \/>\n        jointcommission[.]org<br \/>\n        kcl[.]ac[.]uk<br \/>\n        kingcounty[.]gov<br \/>\n        logitechg[.]com<br \/>\n        mgmresorts[.]com<br \/>\n        michelin[.]co[.]uk<br \/>\n        motoman[.]com<br \/>\n        mylio[.]com<br \/>\n        nhk[.]or[.]jp<br \/>\n        northwestern[.]edu<br \/>\n        ntv[.]co[.]jp<br \/>\n        nyu[.]edu<br \/>\n        nzta[.]govt[.]nz<br \/>\n        ombudsman-services[.]org<br \/>\n        optum[.]com<br \/>\n        ottogroup[.]com<br \/>\n        oxinst[.]com<br \/>\n        panasonic[.]com<br \/>\n        panasonic[.]jp<br \/>\n        pass-jeux[.]gouv[.]fr\n      <\/td>\n<td class=\"code-format\">\n        pearson[.]com<br \/>\n        phrma[.]org<br \/>\n        ping[.]com<br \/>\n        ppg[.]com<br \/>\n        pwc[.]com<br \/>\n        rakuten[.]com<br \/>\n        ranzcp[.]org<br \/>\n        rockwellautomation[.]com<br \/>\n        sahealth[.]sa[.]gov[.]au<br \/>\n        sartorius[.]com<br \/>\n        savingplaces[.]org<br \/>\n        scfederal[.]org<br \/>\n        scholastic[.]com<br \/>\n        sena[.]edu[.]co<br \/>\n        sjsu[.]edu<br \/>\n        skoda-auto[.]cz<br \/>\n        slb[.]com<br \/>\n        stanford[.]edu<br \/>\n        stonybrook[.]edu<br \/>\n        tamu[.]edu<br \/>\n        ted[.]com<br \/>\n        thapar[.]edu<br \/>\n        trxtraining[.]com<br \/>\n        trygghansa[.]se<br \/>\n        turnitin[.]com<br \/>\n        ucdavis[.]edu<br \/>\n        ucl[.]ac[.]uk<br \/>\n        uconn[.]edu<br \/>\n        uhc[.]com<br \/>\n        uib[.]no<br \/>\n        umass[.]edu<br \/>\n        uncc[.]edu<br \/>\n        unicef[.]org<br \/>\n        unilever[.]com<br \/>\n        upmc[.]com<br \/>\n        usc[.]edu<br \/>\n        usopen[.]com<br \/>\n        utexas[.]edu<br \/>\n        virginia[.]edu<br \/>\n        wholetale[.]org<br \/>\n        wiley[.]com<br \/>\n        wsu[.]edu<br \/>\n        zf[.]com\n      <\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">Table 1. Second-level domains (SLDs) that have had a Hazy Hawk subdomain hijack since December 2023. These domains are legitimate and do not include the specific subdomain that was hijacked in the past<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td class=\"code-format\">\n        chesta-korci-bro[.]blogspot[.]com<br \/>\n        pokam-pok[.]blogspot[.]com<br \/>\n        kopde-tuk-kpre[.]blogspot[.]com<br \/>\n        share[.]js[.]org\n      <\/td>\n<\/tr>\n<tr>\n<td>Table 2. Examples of first redirection URLs  <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td class=\"code-format\">\n        accomodateyours[.]com<br \/>\n        viralclipnow[.]xyz<br \/>\n        acceleratetomb[.]xyz<br \/>\n        impliednauseous[.]xyz<br \/>\n        Whilsttypewriter[.]com<br \/>\n        Trusthubmedia[.]com<br \/>\n        Tvddt[.]online<br \/>\n        Propertyportocolom[.]com<br \/>\n        wearychallengeraise[.]com<br \/>\n        Mstores[.]top<br \/>\n        Cambertech[.]xyz<br \/>\n        Extuilowelevid[.]com<br \/>\n        Uxaya[.]sbs<br \/>\n        Lijit[.]com<br \/>\n        viralnow[.]xyz<br \/>\n        cccodes[.]cloud<br \/>\n        Leak[.]eneu[.]io\n      <\/td>\n<\/tr>\n<tr>\n<td>Table 3. Examples of TDS domains  <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td class=\"code-format\">\n        Dankdigs[.]com<br \/>\n        Hotnewrumor[.]com<br \/>\n        Encryptalert[.]com<br \/>\n        ferma[.]co[.]in<br \/>\n        Rssnews[.]media<br \/>\n        Gtrewe[.]co[.]in<br \/>\n        Sualiteregents[.]co[.]in<br \/>\n        Risotoska[.]co[.]in<br \/>\n        Opukoj[.]com\n      <\/td>\n<\/tr>\n<tr>\n<td>Table 4. Examples of push notification request domains  <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td class=\"code-format\">\n        Ferigs[.]xyz<br \/>\n        Apperetive[.]xyz<br \/>\n        Edygik[.]org<br \/>\n        Digitdsk[.]org<br \/>\n        Extuilowelevid[.]com\n      <\/td>\n<\/tr>\n<tr>\n<td>Table 5. Examples of domains from push notifications  <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table>\n<tbody>\n<tr>\n<td class=\"code-format\">\n        Thankstoyou[.]space<br \/>\n        Encryptalert[.]com<br \/>\n        Ok-wwow[.]com<br \/>\n        Fabiansec[.]com<br \/>\n        Cleanupharm[.]com<br \/>\n        Jidoscn[.]sbs<br \/>\n        Spicymaturelovers[.]site<br \/>\n        Nitehushpro24[.]com<br \/>\n        movie[.]rssnews[.]media<br \/>\n        impliednauseous[.]com\n      <\/td>\n<\/tr>\n<tr>\n<td>Table 6. Examples of malicious landing page domains <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3ElderFraudReport.pdf\" target=\"_blank\"><strong>https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3ElderFraudReport.pdf<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/how-scammers-hijack-major-brands\/\"><strong>https:\/\/blogs.infoblox.com\/threat-intelligence\/how-scammers-hijack-major-brands\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/labs.guard.io\/subdomailing-thousands-of-hijacked-major-brand-subdomains-found-bombarding-users-with-millions-a5e5fb892935\" target=\"_blank\"><strong>https:\/\/labs.guard.io\/subdomailing-thousands-of-hijacked-major-brand-subdomains-found-bombarding-users-with-millions-a5e5fb892935<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/who-knew-domain-hijacking-is-so-easy\/\"><strong>https:\/\/blogs.infoblox.com\/threat-intelligence\/who-knew-domain-hijacking-is-so-easy\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/ea226950-2de8-4a39-8ad1-5282c1d394fb\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/ea226950-2de8-4a39-8ad1-5282c1d394fb<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlquery.net\/report\/64ae0264-9f2a-4234-b8b6-8b8a8030a2f4\" target=\"_blank\"><strong>https:\/\/urlquery.net\/report\/64ae0264-9f2a-4234-b8b6-8b8a8030a2f4<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/3f9ac7ce-4a27-44c1-be46-983306fc362d\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/3f9ac7ce-4a27-44c1-be46-983306fc362d<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/0195d776-08e9-7aaa-a2bd-0ab7c495e4af\/\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/0195d776-08e9-7aaa-a2bd-0ab7c495e4af\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/b1ce81c9-a187-454e-817d-07f27d360d34\/\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/b1ce81c9-a187-454e-817d-07f27d360d34\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/js.org\/\" target=\"_blank\"><strong>https:\/\/js.org\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/github.com\/js-org\/js.org\/wiki\" target=\"_blank\"><strong>https:\/\/github.com\/js-org\/js.org\/wiki<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Jeff-Tian\/weshare\" target=\"_blank\"><strong>https:\/\/github.com\/Jeff-Tian\/weshare<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/github.com\/js-org\/js.org\/issues\/9512\" target=\"_blank\"><strong>https:\/\/github.com\/js-org\/js.org\/issues\/9512<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/7d69ac72-0bef-43d7-a215-9de321cf7d39\/\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/7d69ac72-0bef-43d7-a215-9de321cf7d39\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/d2fbd8b3-8599-4ea9-bbb8-d1b2a7881b83\/\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/d2fbd8b3-8599-4ea9-bbb8-d1b2a7881b83\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/01962c74-19c8-749e-89a6-f3090c6893a9\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/01962c74-19c8-749e-89a6-f3090c6893a9<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/b425cad3-2d0f-41ca-ba18-e61ad349956f\" target=\"_blank\"><strong>https:\/\/urlscan.io\/result\/b425cad3-2d0f-41ca-ba18-e61ad349956f<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3ElderFraudReport.pdf\" target=\"_blank\"><strong>https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3ElderFraudReport.pdf<\/strong><\/a><\/li>\n<\/ol>\n<style>\n.savy-seahorse-table {\nfont-size:14px;\nword-break: keep-all;\n}\n.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {\npadding-right:10px;\n}\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\nmargin-top:auto;\n}\n.list-spacing li{margin-bottom:20px}\n.img-container, .img-container-3-col {\ndisplay: flex;\n}\n.img-container img {\n    width: 40%;\n    margin-bottom: 10px;\n    height: max-content !important;\n}\n.img-container-3-col img {\nwidth: 30%;\nmargin-bottom: 10px;\n}\n@media (max-width: 767px) {\n.img-container, .img-container-3-col {\ndisplay: block;\n}\n.img-container img, .img-container-3-col img {\nwidth: 100%;\n}\n.grid-container {\n    grid-template-columns: 1fr!important;\n  }\n}\n@media (min-width: 767px) {\n.img-50{width:50%;}\n}\n.grid-container {\n  display: grid;\n  grid-template-columns: repeat(2, 1fr);\n  gap: 40px;\n  max-width: 800px;\n  margin: 0 auto;\n  align-items: stretch;\n}\n.grid-item {\n   display: flex;\n  flex-direction: column;\n  justify-content: flex-start;\n}\n.grid-item img {\n  width: 100%;\n  height: auto;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('Cloudy with a <span class=\"gradient\">Chance of Hijacking <\/span> Forgotten DNS Records Enable Scam Actor');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Jacques Portal, Ren\u00e9e Burton &nbsp; Hazy Hawk is a DNS-savvy threat actor that hijacks abandoned cloud resources of high-profile organizations. By \u201ccloud resources\u201d we mean things like S3 buckets and Azure endpoints. You might have read about domain hijacking; we and other security vendors have written about different techniques for grabbing control of forgotten [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":11641,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[30,930,828,41,1227],"class_list":{"0":"post-11639","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-dns","9":"tag-cybercrime","10":"tag-scam","11":"tag-cloud","12":"tag-hijacking","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Forgotten DNS Records Enable Cybercrime<\/title>\n<meta name=\"description\" content=\"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forgotten DNS Records Enable Cybercrime\" \/>\n<meta property=\"og:description\" content=\"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-20T15:10:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T15:29:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Forgotten DNS Records Enable Cybercrime\" \/>\n<meta name=\"twitter:description\" content=\"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor\",\"datePublished\":\"2025-05-20T15:10:37+00:00\",\"dateModified\":\"2025-05-29T15:29:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/\"},\"wordCount\":4097,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg\",\"keywords\":[\"DNS\",\"Cybercrime\",\"scam\",\"Cloud\",\"Hijacking\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/\",\"name\":\"Forgotten DNS Records Enable Cybercrime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg\",\"datePublished\":\"2025-05-20T15:10:37+00:00\",\"dateModified\":\"2025-05-29T15:29:11+00:00\",\"description\":\"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Forgotten DNS Records Enable Cybercrime","description":"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/","og_locale":"en_US","og_type":"article","og_title":"Forgotten DNS Records Enable Cybercrime","og_description":"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/","og_site_name":"Infoblox Blog","article_published_time":"2025-05-20T15:10:37+00:00","article_modified_time":"2025-05-29T15:29:11+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Forgotten DNS Records Enable Cybercrime","twitter_description":"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor","datePublished":"2025-05-20T15:10:37+00:00","dateModified":"2025-05-29T15:29:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/"},"wordCount":4097,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg","keywords":["DNS","Cybercrime","scam","Cloud","Hijacking"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/","name":"Forgotten DNS Records Enable Cybercrime","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg","datePublished":"2025-05-20T15:10:37+00:00","dateModified":"2025-05-29T15:29:11+00:00","description":"Learn about a threat actor who discovers lingering DNS records from discontinued cloud services and uses them to deliver scams through adtech.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=11639"}],"version-history":[{"count":32,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11639\/revisions"}],"predecessor-version":[{"id":11698,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11639\/revisions\/11698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/11641"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=11639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=11639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=11639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}