Common Information
Type Value
Value
Domains - T1584.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the act of changing the registration of a domain name without the permission of the original registrant.(Citation: ICANNDomainNameHijacking) Adversaries may gain access to an email account for the person listed as the owner of the domain. The adversary can then claim that they forgot their password in order to make changes to the domain registration. Other possibilities include social engineering a domain registration help desk to gain access to an account or taking advantage of renewal process gaps.(Citation: Krebs DNS Hijack 2019) Subdomain hijacking can occur when organizations have DNS entries that point to non-existent or deprovisioned resources. In such cases, an adversary may take control of a subdomain to conduct operations with the benefit of the trust associated with that domain.(Citation: Microsoft Sub Takeover 2020) Adversaries who compromise a domain may also engage in domain shadowing by creating malicious subdomains under their control while keeping any existing DNS records. As service will not be disrupted, the malicious subdomains may go unnoticed for long periods of time.(Citation: Palo Alto Unit 42 Domain Shadowing 2022)
Details Published Attributes CTI Title
Details Website 2035-08-05 23 Inside Jahoo (Otlard.A ?) - A spam Botnet
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2024-12-19 17 Silent Push uncovers a large Russian Ursnif/Gozi banking trojan operation targeting global AnyDesk users. — Silent Push Threat Intelligence
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-12-03 48 Privacy tools (not) for you — Silent Push Threat Intelligence
Details Website 2024-11-30 4 Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade
Details Website 2024-11-17 0 Don’t Hold Down The Ctrl Key Warning As New 2SP Cyber Attacks Emerge | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-17 1 [CHORT] - Ransomware Victim: texanscan[.]org - RedPacket Security
Details Website 2024-11-17 1 Digital certificates
Details Website 2024-11-17 1 How I Found open-redirect vulnerability using virus total?
Details Website 2024-11-17 1 The Road to CRTP Cert — Part 2
Details Website 2024-11-17 0 Black Friday and Cyber Monday: A Hotspot for Cyber Crime | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-16 18 Look This !
Details Website 2024-11-16 18 Browser’s Secret Diary: Memory Dumps Unveiled
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 14 Building an Integrated Threat Intelligence Platform Using Python and Kibana
Details Website 2024-11-16 12 Why Traditional Phishing Trainings fail and How Firewalls Fill the Gap
Details Website 2024-11-16 1 Cybercrime police nabs two on charges of cheating-Telangana Today | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-16 0 Certified Cyber Defender (CCD) Study Notes PDF
Details Website 2024-11-16 0 Towards Zero Trust and Attribute-Based Encryption
Details Website 2024-11-16 6 Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC
Details Website 2024-11-16 4 Kali Linux : Footprinting using Spiderfoot
Details Website 2024-11-16 40 ‘Tis the season to be wary’: Huge online retail scam uncovered in the lead-up to Christmas. — Silent Push Threat Intelligence
Details Website 2024-11-15 35 Strategies to Counter Phishing
Details Website 2024-11-15 18 Browser’s Secret Diary: Memory Dumps Unveiled