Common Information
Type Value
Value
Domains - T1584.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the act of changing the registration of a domain name without the permission of the original registrant.(Citation: ICANNDomainNameHijacking) Adversaries may gain access to an email account for the person listed as the owner of the domain. The adversary can then claim that they forgot their password in order to make changes to the domain registration. Other possibilities include social engineering a domain registration help desk to gain access to an account or taking advantage of renewal process gaps.(Citation: Krebs DNS Hijack 2019) Subdomain hijacking can occur when organizations have DNS entries that point to non-existent or deprovisioned resources. In such cases, an adversary may take control of a subdomain to conduct operations with the benefit of the trust associated with that domain.(Citation: Microsoft Sub Takeover 2020) Adversaries who compromise a domain may also engage in domain shadowing by creating malicious subdomains under their control while keeping any existing DNS records. As service will not be disrupted, the malicious subdomains may go unnoticed for long periods of time.(Citation: Palo Alto Unit 42 Domain Shadowing 2022)
Details Published Attributes CTI Title
Details Website 2012-03-16 24 Post mortem report on the sinowal/nu.nl incident
Details Website 2012-03-14 13 BlackHat EU 2012 – Day 1 | Corelan Cybersecurity Research
Details Website 2012-03-03 8 Android Debug Bridge (adb)  |  Android Developers
Details Website 2012-02-22 5 Rovnix Reloaded: new step of evolution | WeLiveSecurity
Details Website 2012-02-17 1 An Exploit Kit Was Sent To You
Details Website 2012-02-01 29 TDL4 - Purple Haze (Pihar) Variant - sample and analysis
Details Website 2012-01-12 61 Blackhole Ramnit - samples and analysis
Details Website 2012-01-04 5 ZeuS – P2P+DGA variant – mapping out and understanding the threat
Details Website 2012-01-03 7 (UAC) User Assisted Compromise :: malicious.link — welcome
Details Website 2011-12-30 82 December 2011 Cyber Attacks Timeline (Part II)
Details Website 2011-12-21 24 Postcards from the post-XSS world
Details Website 2011-12-19 43 The truth behind "Yeah!! It happens on television!!"(A Facebook Spam)
Details Website 2011-12-11 36 Troubleshooting faulty network connectivity, part 2: Essential network commands
Details Website 2011-11-29 0 Danger worm hijacks Facebook accounts to inject banking Trojan
Details Website 2011-11-28 3 Troubleshooting faulty network connectivity, part 1: A step-by-step guide
Details Website 2011-11-21 2 Hexacorn | Blog Automation vs. In-depth Malware Analysis
Details Website 2011-11-16 191 The Canadian Connection: An investigation of Syrian government and Hezbullah web hosting in Canada - The Citizen Lab
Details Website 2011-11-10 0 Virus Bulletin :: Significant rise in Chinese phishing sites
Details Website 2011-10-19 169 Dirt Jumper DDoS Bot - New versions, New targets
Details Website 2011-10-16 14 October 2011 Cyber Attacks Timeline (Part I)
Details Website 2011-09-02 17 August 2011 Cyber Attacks Timeline
Details Website 2011-08-30 3 Hackers Get Hold Of Wildcard Google SSL Certificate - Could Hijack Gmail Accounts - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2011-08-29 101 Aug 28 Morto / Tsclient - RDP worm with DDoS features
Details Website 2011-08-26 5 The subtle / deadly problem with CSP
Details Website 2011-07-19 12 What has happened to DNS Security?