Cybersecurity experts from Eclypsium and Infoblox have discovered a powerful DNS assault known as the Sitting Ducks attack. This technique allows hackers to hijack domains and redirect users to malicious websites, emphasizing the need for robust defenses against phishing and data breaches. First detected by Matt Bryant in August 2016, the Sitting Ducks attack resurfaced with new threats in June 2024. Unlike traditional domain control methods, this attack exploits lame delegation. Lame delegation occurs when a domain's DNS services are assigned to a provider other than the registrar, but the authoritative name servers lack domain information. Hackers can register these domains and control all domains pointing to them. Attackers exploit this vulnerability by scanning for domains with lame delegations and claiming ownership without authorization and create malicious records for hijacked domains, routing traffic to their servers. Variations include exploiting typos in name server information and using dangling DNS records with invalid data from forgotten configurations. Research reveals that multiple actors, particularly Russian cybercriminals, use this attack vector, hijacking hundreds of domains daily. According to Infoblox, more than 35,000 domains have been hijacked since 2018, while the real figure is probably much greater. The consequences are severe, involving malware delivery, phishing, brand impersonation, and data exfiltration. With over 1 million exploitable domains, this attack is easy to perform and nearly undetectable. To prevent Sitting Ducks attacks, use an authoritative DNS provider separate from your registrar, ensure valid name server delegation, and regularly audit DNS records. To prevent such vulnerabilities, effective management of DNS records and domain names is crucial. Stay safe by staying informed and proactive in your DNS management.
LexisNexis Legal & Professional has confirmed that hackers breached its servers and accessed a portion of customer and business information, following the leak of approximately 2GB...
A critical Remote Code Execution (RCE) vulnerability has been discovered in the OpenStack Vitrage Root Cause Analysis (RCA) service. The flaw, identified as CVE-2026-28370, carries...
A prolonged cyber-espionage operation attributed to the India-nexus threat actor “Sloppy Lemming” has been uncovered, targeting government and critical infrastructure entities ...