Description

Cybersecurity experts from Eclypsium and Infoblox have discovered a powerful DNS assault known as the Sitting Ducks attack. This technique allows hackers to hijack domains and redirect users to malicious websites, emphasizing the need for robust defenses against phishing and data breaches. First detected by Matt Bryant in August 2016, the Sitting Ducks attack resurfaced with new threats in June 2024. Unlike traditional domain control methods, this attack exploits lame delegation. Lame delegation occurs when a domain's DNS services are assigned to a provider other than the registrar, but the authoritative name servers lack domain information. Hackers can register these domains and control all domains pointing to them. Attackers exploit this vulnerability by scanning for domains with lame delegations and claiming ownership without authorization and create malicious records for hijacked domains, routing traffic to their servers. Variations include exploiting typos in name server information and using dangling DNS records with invalid data from forgotten configurations. Research reveals that multiple actors, particularly Russian cybercriminals, use this attack vector, hijacking hundreds of domains daily. According to Infoblox, more than 35,000 domains have been hijacked since 2018, while the real figure is probably much greater. The consequences are severe, involving malware delivery, phishing, brand impersonation, and data exfiltration. With over 1 million exploitable domains, this attack is easy to perform and nearly undetectable. To prevent Sitting Ducks attacks, use an authoritative DNS provider separate from your registrar, ensure valid name server delegation, and regularly audit DNS records. To prevent such vulnerabilities, effective management of DNS records and domain names is crucial. Stay safe by staying informed and proactive in your DNS management.