What Is Domain Hijacking?

Domain hijacking is a type of cyber attack that involves taking over someone’s domain through unauthorized access or creating changes in the DNS records. Due to a lack of hijacking-specific laws, once it occurs, it’s difficult to get your domain back, making prevention crucial. Learn all about it here.

Developing your website’s reputation and SEO ranking can take years of work and investment. The trouble is, the more traffic you gain, the likelier it is to attract unwanted attention from scammers and cybercriminals.

One common type of cyber attack website owners suffer from is domain hijacking. In this article, we’ll show you what it is, how to prevent it, and what to do if it happens.

Domain Hijacking Definition

Domain hijacking, often known as domain theft, is a type of cyberattack in which the perpetrator changes the registration of a domain name without the consent of the original owner. It revolves around taking control of a domain name, removing access (and authorization) from the registrant, and giving it to another party.

Domain hijacking can be disastrous to a business and its brand and online reputation. Potential damages include:

  • Loss of reputation,
  • Your brand being associated with scams and malware,
  • Inability to recover your domain name,
  • Loss of access to your email domain,
  • Hackers reading (and replying to) emails containing sensitive information,
  • Legal liability,
  • Data leaks,
  • Financial damage (asset loss).

Once a hijacker takes control of the domain, they can use it for whichever purpose they choose, such as:

  • Using the website for phishing,
  • Sending and receiving emails from your customers,
  • Affecting the performance of your website and/or app,
  • Redirecting payments to a different bank account.

Domain Hijacking vs. DNS Poisoning

Both domain hijacking and DNS poisoning have the same goal of tricking users into visiting hacker-owned websites instead of a legitimate one. The way they go about it differs, as explained in the table below:

Domain HijackingDNS Poisoning
Who Gets Attacked:Domain owner.DNS server.
What Happens:Hackers take over the domain by getting registrars to change owner records in the domain name system (DNS).Hackers change DNS settings directly.
Where the User Goes:They visit the same website now owned by hackers.DNS servers point them to a different IP address (i.e., different website).

MORE: How to register a domain name


Using the new IP address, cybercriminals can create an identical copy of your website via a cybersquatting domain and take control of any transactions. Alternatively, they can add malware, set up a phishing scam, or attempt to steal sensitive information from visitors.

Domain Name Hijacking vs. Domain Hacking

Although they sound similar, they are worlds apart. Domain hacking has nothing to do with cybersecurity. It’s a term that signifies a practice of combining top-level domains (TLDs) with the unique part of your domain name into a meaningful word or phrase.

For example, you can use a domain type that fits an expression (unroll.me) or an abbreviation in your industry (such as .io and .ai domains).


MORE: Domain name trends for 2023


Popular examples of domain hacking include:

  • Instagr.am,
  • Bit.ly,
  • Cash.app,
  • Pep.si,
  • Nyti.ms.

How Does Domain Hijacking Work?

There are several ways domain hijacking takes place. The most common one is social engineering, i.e., tricking domain owners into sharing private information and login credentials. Another example revolves around following registration expiration dates and registering the name if the current owner forgets to do so.

You might think that would never happen to you. Yet, according to the World Economic Forum, 95% of all cybersecurity issues occur due to human error.

A hijacker can gain access to your domain’s control panel or your email address. When the latter is the case, they can impersonate you and contact your registrar requesting to change ownership. Usually, they request to transfer the domain name to another registrar (located in another country), which makes recovery difficult.

If social engineering or taking over a registration fail, hackers can turn to technical methods. There are four types of technical hijacking:

  1. Router hijacking: It’s usually the first port of call for hijackers. A lot of routers use default passwords and have firmware deficiencies, leaving them vulnerable to unauthorized logins. Once they access a router, hijackers can modify settings or select a fraudulent DNS server as the preferred option.
  2. Local hijacking: It requires hackers to install Trojan malware onto your system and change your local DNS settings.
  3. Rogue hijacking: This type revolves around attacking your internet provider and changing records on its name server. It results in a large number of users of the same provider being redirected to a fraudulent DNS server.
  4. Man in the middle: Similar to DNS poisoning, man-in-the-middle attacks focus on intercepting communication between a user and DNS, providing users with a different IP address. This is possible only via non-encrypted DNS queries. The difference between this and DNS poisoning is that the latter affects DNS records, while the former targets users’ connections.

In rare situations, hijacking can also happen due to security vulnerabilities in your registrar’s system.

Is Domain Hijacking Illegal?

Technically, domain hijacking is considered theft. However, since you haven’t lost any physical product, it’s hard to prove that a change of data in the DNS registry equates to having your diamond ring stolen. There are no international or U.S. laws that address this particular type of cybercrime.

What makes the whole thing difficult is that you need to file a court action in the country where the affected DNS server is located, not in your jurisdiction.

Having said that, there were instances where U.S. courts have found people guilty of domain theft. In 2017, an ex-employee who had login credentials redirected a business’s domain to an adult content website. A court in Arizona sentenced him to four years of federal probation and gave him a $9,000 fine.

There are also older instances, such as Stephen M. Cohen being arrested in 2005 after failing to pay $65 million for hijacking the domain name Sex.com.

How to Prevent Domain Hijacking

The best way to protect yourself from domain hijacking is to make sure it never happens. You should constantly check the latest developments in cybersecurity and check if your system is well protected. According to Cisco, cyber fatigue (failing to proactively defend from attacks) affects 42% of businesses.

You can prevent domain hijacking by doing the following:

  • Using two-factor authentication,
  • Using strong passwords,
  • Pick a reputable registrar,
  • Secure your domain name,
  • Enable auto-renewal of your registration,
  • Use WHOIS privacy protection,
  • Keep your systems updated,
  • Check who has access to your domain’s control panel,
  • Check emails that request access to your backend,
  • Make sure your contact information is up to date.

How to Recover Hijacked Domains

Unfortunately, there’s not a lot you can do once hijacking happens, which is why it’s paramount to do all you can to prevent it. 

If you’ve been a victim of domain hijacking, you should reach out to your registrar immediately and inform them of the attack. The faster you notice the hijacking attempt and contact your registrar, the more chances there are they will be able to restore your ownership. Once a domain transfer is complete, your registrar can no longer help you.

At this stage, you can contact ICANN and get them to resolve the issue. This is a viable option if you have trademarked your domain name, which would allow you to invoke the Uniform Domain-Name Dispute-Resolution Policy (UDRP).

Finally, you can consider legal actions, but as we’ve said, there’s a lack of laws (and enforcement of them), and you’ll need to deal with jurisdiction issues as well.

If the hijacking occurs, try to establish a safe line of communication with your users and inform them immediately that your website is no longer secure.


MORE: How to change a domain name


Takeaway Points

The more your online business grows, the more interesting you will be to cybercriminals. You need to make sure that your domain name is safe and that your cybersecurity efforts are constantly evolving.

Losing a domain name to a hijacker can destroy your brand and make you lose your entire customer base. The trouble is, laws against hijacking are not yet established, so the best cure is prevention.

If you still haven’t chosen your domain name, we can help you. Use our domain name generator to get 1,000+ name ideas for free. We use AI-powered algorithms to come up with catchy, memorable names for your website.

Frequently Asked Questions (FAQ)

Famous examples of domain hijacking include:
  • Sex.com,
  • Google (Vietnamese ccTLD),
  • Lenovo,
  • 117 Microsoft subdomains,
  • Cafax,
  • Hypixel.

A domain hijacking attack is when someone gets hold of your domain name’s login credentials and changes ownership details. This happens through unauthorized work, such as social engineering, phishing, changing DNS records, and hacking routers.

The most common way to commit hijacking is through social engineering, i.e., getting domain name owners to share sensitive information with you through various psychological tactics. Hijacking can happen when an attacker gains access to someone’s email and resets the passwords to their domain name registrar’s account. Other ways involve a more technical approach, such as router hijacking, man-in-the-middle attacks, and DNS poisoning.

Although it’s considered theft, there are no international laws that explicitly regulate punishment for domain hijacking. Most commonly, when a hijacker takes control of your domain, they transfer it to a different registrar that’s located in a different country. This makes legal pursuit difficult and time-consuming.

If you register a domain name that infringes on someone else’s trademark, they can file a lawsuit against you. If you’ve done this unknowingly, the court will usually order you to transfer domain name usage rights only. If you’ve done it in bad faith, you can expect to pay monetary damages to the trademark owner.

Domain hijackers steal domains for a variety of reasons. For example, they do it to launch phishing and spam campaigns, start a social engineering scan, set up cybercrime activities, and redirect payments. Sometimes, domain stealing can be socially or politically motivated.

Also known as reverse cybersquatting, it’s a practice of using cybersquatting laws in bad faith by trying to convince the original domain name owner is infringing on a trademark. For example, when a hijacker notices a popular domain name, they can take out a trademark with the same or similar name and accuse the domain name owner of cybersquatting, forcing them to hand over usage rights.

Author

We use cookies to offer you our service. By using this site, you agree to our: See cookie policy