Domain hijacking is the act of changing the registration of a domain name without the permission of the original owner, or by abuse of privileges on domain hosting and domain registrar systems.
Domain name hijacking is devastating to the original domain name owner's business with wide ranging effects including:
Note many countries (and/or customers) will hold your organization responsible for data breaches or data leaks, regardless of whether they result from a cyber attack like domain hijacking or misconfiguration. Domain hijacking is a real cyber threat, preventing it must be part of your cybersecurity efforts.
Before we dive into the details of domain hijacking, it's helpful to understand how the domain name system (DNS) works and its limitations.
Each top-level domain (TLD) is managed by an organization called a domain name registry, which is appointed by the Internet Corporation for Assigned Names and Numbers (ICANN).
The most popular TLDs are managed by large organizations such as Verisign (.com and .net) or Public Interest Registry (.org).
National domains like .io or .com.au are managed by organizations in their respective countries.
One important thing to understand is registries do not always manage domain name registration. Companies that handle domain registration are called domain name registrars (versus domain name registries) and are usually accredited by registries.
Accredited registrars may then subcontract to non-accredited registrars, increasing third-party risks and fourth-party risks and lengthening the time to resolve potential domain name disputes.
This is because each registrar has its own rules and requirements for proving domain ownership and approving domain transfers.
That said, most TLDS allow anyone to register the domain on one registrar and transfer control of the domain to another registrar (such as from Namecheap to Google domains) for any reason, such as better pricing, better security measures or a better customer experience.
This has its benefits but also makes domain hijacking possible.
Domain hijacking is a risk to your business even if it's not your domain that is hijacked. Any third-party vendor you regularly communicate with or that handles your or your customer's data could have its domain hijacked.
Domain hijacking prevention controls must be part of your Vendor Risk Management and Third-Party Risk Management frameworks.
While transferring domains is a little more complicated than registering a new domain, in practice it is a very simple process.
Generally domain hijacking occurs from unauthorized access to, or exploitation of a vulnerability in a domain name registrar, through social engineering, or by gaining access to the domain name owner's email address and then resetting the password to their domain name registrar.
Another common tactic is to gather personal information about the actual domain name owner to impersonate them and persuade the domain registrar to modify registration information or transfer the domain to another registrar they control.
Other methods include email vulnerability, vulnerability at the domain-registration level, keyloggers to steal login credentials and phishing attacks.
Your ability to recover a hijacked domain will largely depend on what your registrar can do to reverse the attack. Sometimes registration information can be returned to the original owner.
This becomes more difficult when the hijacker was able to transfer to another registrar, particularly if the registrar operates in a different jurisdiction.
When a stolen domain is transferred to another registrar, ask your registrar to invoke ICANN's Registrar Transfer Dispute Resolution Policy to try regain control of the domain. Another option is to pursue recovery of stolen domain names through ICANN's Uniform Domain Dispute Resolution Policy (UDRP) but the policy may not be appropriate for cases involving domain theft.
In some cases, this won't work and you will need to pursue legal action from the courts to reclaim the domain. This can be a lengthy process that doesn't immediately fix the real issue (lose of website and/or email accounts), which is why preventing domain hijacking is the most important thing.
The legal status of domain hijacking remains unclear but certain U.S. federal courts have begun to accept causes of action that seek to return stole domain names to the original owners.
Domain hijacking is no different to theft, the original owner is deprived of the benefits of the domain and cannot conduct business as usual. The legal status is due to theft traditionally being associated with physical goods like jewelry, electronics or money.
Domain ownership is only stored in a digital state on the domain registry, there is no real physical presence.
This is further complicated because court actions are generally filed in the location of the relevant domain registry, rather than where the victim is located. In some jurisdictions, police may arrest domain hijackers.
To reduce the prevent of successful domain hijacking, ICANN imposes a 60-day waiting period between a change in registration information and a registrar transfer. Transferred domains are more difficult to reclaim and it is thought the original registrant will discover the changes in the 60 days and alert their registrar.
Extensible Provisioning Protocol (EPP) is used by many TLD registries as it provides an authorization code exclusively to the domain registrant as a security measure to prevent unauthorized transfers.
Prior to EPP, registries had no uniform approach and many different proprietary interfaces existed, EPP provides a more robust and flexible way to provide communication between domain name registries and domain name registrars.
Additionally, the following steps may help to prevent unwanted domain transfers:
Reverse domain hijacking (or reverse cybersquatting) is when a registered trade mark owner attempts to secure a domain name by making false typosquatting claims against a domain name's rightful registrant.
Whether your organization has one domain or thousands, our platform can monitor your organization's and its vendor's websites for susceptibility to domain hijacking, DNSSEC issues, typosquatting, man-in-the-middle attacks and other vulnerabilities.
UpGuard Breach Risk can also help prevent data breaches and data leaks of sensitive data and personally identifiable information (PII), protecting your customer's trust through cyber security ratings and continuous exposure detection.