Get a Pentest and security assessment of your IT network.

Cyber Security

Domain Hijacking: Nameserver Risks

TL;DR

Yes, a domain can be taken over if your custom nameservers are misconfigured. This is because DNS (the system that directs people to your website) relies on these servers. If they’re wrong or compromised, attackers can redirect traffic to their own sites.

How Domain Hijacking Happens with Nameserver Issues

Your domain name registrar points your domain to nameservers. These nameservers tell the internet where your website and email are hosted. If you use custom nameservers (instead of those provided by your registrar), you’re responsible for keeping them accurate and secure.

Steps to Protect Your Domain

  1. Understand Your Nameserver Configuration: Know which nameservers your domain is using. You can find this information at your domain registrar.
    • Log in to your registrar’s website.
    • Look for a section called ‘DNS Management’, ‘Nameservers’, or similar.
    • You should see a list of nameservers (usually two or more).
  2. Verify Nameserver Records: Make sure the nameservers listed at your registrar are correct and point to the servers you control.
    • Use a DNS lookup tool like Google Admin Toolbox Dig or MXToolbox.
    • Enter your domain name and select ‘NS’ (Nameserver) as the record type.
    • The results should match the nameservers configured at your registrar.
  3. Secure Your Nameservers: Protect the servers themselves from compromise.
    • Strong Passwords: Use strong, unique passwords for all accounts associated with your nameserver infrastructure.
    • Regular Updates: Keep the server software up to date with the latest security patches.
    • Firewall: Configure a firewall to restrict access to only necessary ports and services.
    • Monitoring: Implement monitoring to detect unauthorized changes or suspicious activity.
  4. Implement DNSSEC (Domain Name System Security Extensions): This adds a layer of security by digitally signing your DNS records, making it harder for attackers to tamper with them.
    • DNSSEC is complex to set up and requires support from both your registrar and nameserver provider.
    • Check if your registrar and nameserver provider offer DNSSEC services.
  5. Use a Reliable Nameserver Provider: If you’re not comfortable managing your own nameservers, consider using a reputable third-party provider.
    • These providers typically have robust security measures in place.
    • Examples include Cloudflare, Amazon Route 53, and Google Cloud DNS.
  6. Regularly Check Your WHOIS Information: Ensure the contact information associated with your domain is accurate.
    • An attacker could try to change this information to gain control of your domain.
    • You can check your WHOIS information using a WHOIS lookup tool like DomainTools WHOIS.
  7. Lock Your Domain: Most registrars offer domain locking, which prevents unauthorized transfers.
    • Enable this feature to add an extra layer of protection.
    • Look for a ‘Domain Lock’ or ‘Transfer Lock’ option in your registrar’s control panel.

What if You Suspect Your Domain Has Been Hijacked?

  1. Contact Your Registrar Immediately: They can help you regain control of your domain and investigate the issue.
  2. Change Your Passwords: Update passwords for all accounts associated with your domain, including registrar, nameserver, and hosting accounts.
  3. Review DNS Records: Check for any unauthorized changes to your DNS records.
  4. Notify Users: If your email has been affected, notify your users of the potential security breach.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation