Wednesday, May 7, 2025
HomeCyber AttackDangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Published on

SIEM as a Service

Follow Us on Google News

Hackers are exploiting what’s known as “Dangling DNS” records to take over corporate subdomains, posing significant threats to organizations’ security frameworks.

This attack vector has been increasingly noted by security teams, highlighting the need for constant vigilance in DNS configuration management.

A New Threat Landscape

Subdomain takeovers occur when a misconfigured or unused subdomain’s DNS entry, particularly canonical name (CNAME) records, points to an expired or non-existent service.

- Advertisement - Google News
Dangling DNS Attack
An example defaced website resulting from a subdomain takeover attack

This scenario, termed “Dangling DNS,” not only involves CNAME records but also other DNS record types like NS, MX, A, and AAAA.

When organizations discontinue a service or fail to update DNS entries post-service termination, attackers can register the abandoned subdomain with the service provider, gaining control over it.

For instance, if a company’s help desk subdomain was previously hosted on a SaaS platform like Zendesk and the service was terminated without updating the DNS, an attacker could initiate a free trial with the same provider under the company’s subdomain, thus taking control.

Cloud service misconfigurations present another avenue for these attacks.

If an organization deletes a cloud resource like an AWS S3 bucket used for hosting a static website without removing or updating the corresponding DNS entries, attackers can register a new bucket with the same subdomain name, redirecting and potentially maliciously modifying traffic.

A recent research investigation from October 2024 to January 2025 by security researchers found approximately 150 S3 buckets, previously owned by major corporations and government agencies, that were deleted but still referenced by outdated DNS records.

Over 8 million requests were made to these non-existent buckets, seeking various critical resources like container images and SSLVPN server configurations.

Dangling DNS Attack
An example 404 error message from a missing AWS S3 bucket behind a subdomain

The Supply Chain Risk

The implications extend beyond mere website defacement or credential theft, which are traditional outcomes of subdomain takeovers.

With organizations using subdomains to distribute software updates, cloud service templates, and other critical assets, an attacker could inject malicious code into these supply chains, leading to potential remote code execution (RCE), resource hijacking, or even persistent backdoors.

SentinelOne, a cybersecurity firm, has identified over 1,250 instances of subdomain takeover risks due to deprovisioned cloud resources in the past year.

They advocate for robust security practices across the entire software development lifecycle, emphasizing that runtime security is critical, especially when involving third-party services.

This emerging threat underscores the importance of meticulous DNS management.

Organizations must ensure their subdomains are either actively used or securely decommissioned, removing all associated DNS records to prevent exploitation. 4

As the cyber landscape evolves, maintaining proactive security measures through vigilant monitoring and timely updates to cloud and DNS configurations is paramount to safeguarding against these sophisticated attacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

NSO Group Ordered to Pay $168 Million to WhatsApp in US Spyware Verdict

A federal jury in California has ordered Israeli spyware maker NSO Group to pay...

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Uncovering the Security Risks of Data Exposure in AI-Powered Tools like Snowflake’s CORTEX

As artificial intelligence continues to reshape the technological landscape, tools like Snowflake’s CORTEX Search...

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

NSO Group Ordered to Pay $168 Million to WhatsApp in US Spyware Verdict

A federal jury in California has ordered Israeli spyware maker NSO Group to pay...

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Uncovering the Security Risks of Data Exposure in AI-Powered Tools like Snowflake’s CORTEX

As artificial intelligence continues to reshape the technological landscape, tools like Snowflake’s CORTEX Search...