Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsResearchers Hijack Hacker Domain Using Name Server Delegation
Researchers Hijack Hacker Domain Using Name Server Delegation
Cybersecurity

Researchers Hijack Hacker Domain Using Name Server Delegation

•January 19, 2026
0
GBHackers On Security
GBHackers On Security•Jan 19, 2026

Companies Mentioned

Infoblox

Infoblox

BLOX

Mastercard

Mastercard

MA

GCash

GCash

Why It Matters

The incident proves that weak DNS hygiene can be weaponized both by attackers and defenders, underscoring an urgent need for rigorous domain management across the internet.

Key Takeaways

  • •Lame delegation lets anyone claim abandoned domains
  • •Infoblox captured 57 million push‑notification logs
  • •Network spanned 120 domains, 30 MB/s traffic
  • •Ads generated only $350 daily, 1/60k CTR
  • •50% of victims located in South Asia

Pulse Analysis

DNS delegation is a foundational element of internet routing, yet many organizations overlook the security implications of misconfigured nameserver records. When a domain points to external nameservers that lack authoritative data—a condition known as a "lame delegation"—the domain becomes a "sitting duck" that can be claimed by any party with access to the registrar. Threat actors have long leveraged this weakness to host malware or run fraudulent campaigns, but the Infoblox study demonstrates that defenders can also turn the technique into a powerful intelligence‑gathering tool.

By seizing control of abandoned malicious domains, Infoblox’s team positioned itself alongside the adversary’s infrastructure, receiving duplicate push‑notification payloads in cleartext. Over a two‑week window the operation harvested 57 million logs, revealing a global advertising network delivering deceptive content in more than 60 languages. The network’s economics were starkly inefficient—only $350 in daily revenue and a click‑through rate of roughly one in 60,000—yet it persisted, bombarding victims with an average of 140 notifications per day. The bulk of traffic originated from South Asia, highlighting regional exposure to low‑cost, high‑volume scam campaigns.

The broader lesson for enterprises is clear: DNS hygiene is no longer a back‑office concern but a frontline security control. Regular audits of nameserver delegations, verification that external servers host complete zone data, and rapid remediation of abandoned domains can eliminate the “sitting duck” condition. Organizations should also monitor for unexpected traffic spikes on domains they no longer actively use, as such anomalies often signal abuse. Strengthening DNS governance not only thwarts attackers from hijacking domains but also prevents defenders from needing to resort to unconventional interception tactics.

Researchers Hijack Hacker Domain Using Name Server Delegation

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...