{"id":2151,"date":"2023-08-30T08:45:00","date_gmt":"2023-08-30T06:45:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2151"},"modified":"2023-08-31T07:59:44","modified_gmt":"2023-08-31T05:59:44","slug":"subdomain-hijacking","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/subdomain-hijacking\/","title":{"rendered":"Thousands of Organizations Vulnerable to Subdomain Hijacking"},"content":{"rendered":"\n<p>Subdomain Hijacking presents a concerning scenario where attackers take control of websites hosted on subdomains owned by reputable organizations, enabling them to carry out activities such as malware distribution, disinformation campaigns, and phishing attacks. The surge in cloud service adoption coupled with the proliferation of disinformation and phishing efforts has intensified the magnitude of this vulnerability.<\/p>\n\n\n\n<p>Certitude Consulting has detected instances of subdomain hijacking attacks targeting prominent public authorities. While this vulnerability is not novel, we have undertaken a comprehensive analysis to gauge its gravity, yielding alarming outcomes. Through an examination of a limited sample of cloud services and DNS records, we identified over 1,000 susceptible organizations. Among these are notable entities like the Australian Department of Foreign Affairs and Trade, CNN, Stanford University, and FP\u00d6. However, we assume that the scope of affected domains could encompass several hundred thousand or more.<\/p>\n\n\n\n<p>The implications of a subdomain takeover are far-reaching, encompassing a spectrum of potential attacks:<\/p>\n\n\n\n<p><strong>Malware Distribution<\/strong>: Attackers can employ the subdomain as a hosting platform for distributing malicious software.<br><strong>Disinformation Spread<\/strong>: Malicious actors capitalize on the credibility of reputable entities such as media outlets, government bodies, or universities, using subdomains to disseminate false information. This undermines public trust in reliable sources, fosters disinformation campaigns that manipulate public opinion, and destabilizes communities and societies.<br><strong>Phishing Attacks<\/strong>: Attackers can craft convincing phishing pages using the subdomain to trick unsuspecting users into revealing sensitive information.<br><strong>Social Engineering Attacks<\/strong>: The subdomain can serve as a launching pad for compelling social engineering campaigns, manipulating individuals into disclosing confidential data or engaging in harmful activities.<\/p>\n\n\n\n<p>To forestall potential attacks and raise public awareness about this widespread vulnerability, we have proactively assumed control over websites belonging to particularly susceptible organizations and informed them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Government, Party, University and Media Websites Affected<\/h2>\n\n\n\n<p>We have taken over blogs hosted on WordPress.com for the Australian Department of Foreign Affairs and Trade (<a href=\"https:\/\/blog.dfat.gov.au\">https:\/\/blog.dfat.gov.au<\/a>), the UK Meteorological Office (<a href=\"https:\/\/blog.theukmetoffice.gov.uk\">https:\/\/blog.theukmetoffice.gov.uk<\/a>), the US states of Rhode Island (<a href=\"https:\/\/blog.health.ri.gov\">https:\/\/blog.health.ri.gov<\/a>) and Nebraska (<a href=\"https:\/\/test.ne.gov\">https:\/\/test.ne.gov<\/a>) as well as US Based Varobank (<a href=\"https:\/\/blog.varobank.com\">https:\/\/blog.varobank.com<\/a>).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"655\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-blog.dfat_.gov_.au_.png\" alt=\"\" class=\"wp-image-2165\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-blog.dfat_.gov_.au_.png 889w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-blog.dfat_.gov_.au_-300x221.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-blog.dfat_.gov_.au_-768x566.png 768w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/figure>\n\n\n\n<p>Additionally, AWS S3 Buckets referenced by DNS entries from German Ergo Group&#8217;s insurance subsidiary Nexible (<a href=\"http:\/\/s3.nexible.de\/index.html\">http:\/\/s3.nexible.de\/index.html<\/a>) and Germany-based tobacco conglomerate Dannemann (<a href=\"http:\/\/img.dannemann.com\/index.html\">http:\/\/img.dannemann.com\/index.html<\/a>) have been secured by Certitude Consulting.&nbsp; Furthermore, the podcast platforms hosted by Buzzsprout for the Austrian political party FP\u00d6 (<a href=\"https:\/\/podcast.fpoe.at\">https:\/\/podcast.fpoe.at<\/a>), Nasdaq-listed technology firm Netscout Systems&nbsp; (<a href=\"https:\/\/podcast.netscout.com\">https:\/\/podcast.netscout.com<\/a>) and US insurance giant Penn Mutual (<a href=\"https:\/\/podcast.pennmutual.com\/\">https:\/\/podcast.pennmutual.com\/<\/a>) have been taken over. The situation becomes even more concerning as valid TLS certificates were issued for websites hosted on platforms like WordPress or Buzzsprout. This aspect further magnifies the illusion of content legitimacy, making the potential threats even harder to discern.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"884\" height=\"898\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-podcast.fpoe_.at_.png\" alt=\"\" class=\"wp-image-2164\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-podcast.fpoe_.at_.png 884w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-podcast.fpoe_.at_-295x300.png 295w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/0-podcast.fpoe_.at_-768x780.png 768w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><\/figure>\n\n\n\n<p>A similar approach enabled the forced redirection of subdomains. However, no valid TLS certificate is issued in this case. In this manner, we took control of websites belonging to news network CNN (<a href=\"http:\/\/insession.blogs.fortune.cnn.com\">http:\/\/insession.blogs.fortune.cnn.com<\/a>), the government of the Canadian province Newfoundland and Labrador (<a href=\"http:\/\/atippblog.gov.nl.ca\">http:\/\/atippblog.gov.nl.ca<\/a>), international non-governmental organization Caritas (<a href=\"http:\/\/blog.caritas.org\">http:\/\/blog.caritas.org<\/a>), US-based Bankfive (<a href=\"http:\/\/blog.bankfive.com\">http:\/\/blog.bankfive.com<\/a>), University of California (<a href=\"http:\/\/blog.admission.ucla.edu\">http:\/\/blog.admission.ucla.edu<\/a>), University of Pennsylvania (<a href=\"http:\/\/blog.wic.library.upenn.edu\">http:\/\/blog.wic.library.upenn.edu<\/a>) as well as Stanford University (<a href=\"http:\/\/shaqfehgroup.stanford.edu\">http:\/\/shaqfehgroup.stanford.edu<\/a>) and redirected them to a newly created WordPress blog (<a href=\"http:\/\/subdomainhijackingblog.wordpress.com\">http:\/\/subdomainhijackingblog.wordpress.com<\/a>).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding Subdomain Hijacking<\/h2>\n\n\n\n<p>The Domain Name System (DNS) operates as a hierarchical and distributed naming system for online resources such as servers and services. When an organization opts for a cloud service, it creates an account within the service, incorporates resources and materials, and subsequently associates the cloud service with its DNS records on its own DNS servers:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"642\" height=\"172\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking1.drawio.png\" alt=\"\" class=\"wp-image-2154\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking1.drawio.png 642w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking1.drawio-300x80.png 300w\" sizes=\"auto, (max-width: 642px) 100vw, 642px\" \/><\/figure>\n<\/div>\n\n\n<p>When a domain or subdomain has been associated with a specific service hosted on a cloud platform, and that service is no longer in use (due to subscription cancellation or failure to pay for the service), the DNS records continue to point to a non-existent cloud resource, creating what&#8217;s known as a &#8220;dangling&#8221; DNS record:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"642\" height=\"172\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking2.drawio.png\" alt=\"\" class=\"wp-image-2155\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking2.drawio.png 642w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking2.drawio-300x80.png 300w\" sizes=\"auto, (max-width: 642px) 100vw, 642px\" \/><\/figure>\n<\/div>\n\n\n<p>If cloud service providers do not implement specific countermeasures, unauthorized attackers could register an account on the cloud platform and link it to the dangling DNS records. As the organization&#8217;s DNS records still point to the endpoint of the cloud platform, the attacker effectively seizes control over the subdomain, a scenario referred to as &#8220;subdomain hijacking&#8221; or &#8220;subdomain takeover&#8221;:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"642\" height=\"229\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking3.drawio.png\" alt=\"\" class=\"wp-image-2156\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking3.drawio.png 642w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/Subdomain-Hijacking3.drawio-300x107.png 300w\" sizes=\"auto, (max-width: 642px) 100vw, 642px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Preventing Subdomain Hijacking<\/h2>\n\n\n\n<p>Certitude Consulting recommends that all organizations to regularly audit DNS records and to deactivate cloud resources only after associated DNS records have been removed.<\/p>\n\n\n\n<p>In most cases, the hijacking of subdomains could be effectively prevented by cloud services through domain ownership verification and not immediately releasing previously used identifiers for registration. Therefore, Certitude Consulting also urges cloud service providers to implement such protection mechanisms. Microsoft implemented this for Azure Storage Accounts several months ago. Other providers, such as Amazon Web Services, have not yet implemented such mechanisms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Research Methods and Disclosure<\/h2>\n\n\n\n<p>Enumeration methods for dangling DNS records or any vulnerability details identified during this research will not be disclosed publicly at this time. All organizations mentioned in this post have been contacted because of their dangling DNS records. It was not feasible to inform all &gt;1.000 organizations. Coordination with the Austrian CERT is in progress.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>Archived URLs:<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230829125434\/https:\/\/blog.dfat.gov.au\/\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230829125434\/https:\/\/blog.dfat.gov.au\/<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830055441\/https:\/\/blog.theukmetoffice.gov.uk\/\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830055441\/https:\/\/blog.theukmetoffice.gov.uk\/<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830055450\/https:\/\/blog.health.ri.gov\/\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830055450\/https:\/\/blog.health.ri.gov\/<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830055510\/https:\/\/test.ne.gov\/\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830055510\/https:\/\/test.ne.gov\/<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830055605\/https:\/\/blog.varobank.com\/\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830055605\/https:\/\/blog.varobank.com\/<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830055650\/https:\/\/podcast.fpoe.at\/2158749\/13491196-security-awareness-notice\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830055650\/https:\/\/podcast.fpoe.at\/2158749\/13491196-security-awareness-notice<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830055750\/https:\/\/podcast.netscout.com\/2235256\/13491204-security-awareness-notice\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830055750\/https:\/\/podcast.netscout.com\/2235256\/13491204-security-awareness-notice<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830060251\/https:\/\/podcast.pennmutual.com\/2235346\/13491211-security-awareness-notice\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830060251\/https:\/\/podcast.pennmutual.com\/2235346\/13491211-security-awareness-notice<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830055940\/http:\/\/s3.nexible.de\/index.html\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830055940\/http:\/\/s3.nexible.de\/index.html<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/web.archive.org\/web\/20230830060404\/http:\/\/img.dannemann.com\/index.html\" target=\"_blank\">https:\/\/web.archive.org\/web\/20230830060404\/http:\/\/img.dannemann.com\/index.html<\/a><br><a href=\"https:\/\/archive.is\/RIVVu\">https:\/\/archive.is\/RIVVu<\/a><br><a href=\"https:\/\/archive.is\/AqTBG\">https:\/\/archive.is\/AqTBG<\/a><br><a href=\"https:\/\/archive.is\/f0SfN\">https:\/\/archive.is\/f0SfN<\/a><br><a href=\"https:\/\/archive.is\/6kb5c\">https:\/\/archive.is\/6kb5c<\/a><br><a href=\"https:\/\/archive.is\/poPl2\">https:\/\/archive.is\/poPl2<\/a><br><a href=\"https:\/\/archive.is\/ZLuWG\">https:\/\/archive.is\/ZLuWG<\/a><br><a href=\"https:\/\/archive.is\/YIPVZ\">https:\/\/archive.is\/YIPVZ<\/a><br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We identified >1000 organizations susceptible to subdomain hijacking. Among them are Australian foreign ministry, CNN, Stanford University, FP\u00d6, US states, German enterprises, US banks, universities, Governments,&#8230; We only analyzed a limited sample of cloud services and DNS records. We assume that the total of affected domains could be several hundred thousand or more.<\/p>\n","protected":false},"author":15,"featured_media":2175,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60,103],"tags":[],"class_list":["post-2151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-analysis","category-vulnerability-research-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2151"}],"version-history":[{"count":22,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2151\/revisions"}],"predecessor-version":[{"id":2207,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2151\/revisions\/2207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/2175"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}