logo
DNS Abuse Techniques Matrix
Creation of malicious subdomains under dynamic DNS providers
  • English
  • Japanese
Initializing search
    • Index
    • Actions
    • Techniques
      • DGAs
      • Domain name compromise
      • Lame delegations
      • DNS cache poisoning
      • DNS rebinding
      • DNS server compromise
      • Stub resolver hijacking
      • Local recursive resolver hijacking
      • On-path DNS attack
      • DoS against the DNS
      • DNS as a vector for DoS
      • Dynamic DNS resolution (as obfuscation technique)
      • Dynamic DNS resolution: Fast flux (as obfuscation technique)
      • Infiltration and exfiltration via the DNS
      • Malicious registration of (effective) second level domains
      • Creation of malicious subdomains under dynamic DNS providers
      • Compromise of a non-DNS server to conduct abuse
      • Spoofing or otherwise using unregistered domain names
      • Spoofing of a registered domain
      • DNS tunneling - tunneling another protocol over DNS
      • DNS beacons - C2 communication
    • Stakeholders
    • Abuse Matrices

    Creation of malicious subdomains under dynamic DNS providers

    Before attacking a victim, adversaries purchase or create domains from an entity other than a registrar or registry that provides subdomains under domains they own and control. See also https://en.wikipedia.org/wiki/Dynamic_DNS

    Previous
    Malicious registration of (effective) second level domains
    Next
    Compromise of a non-DNS server to conduct abuse
    FIRST DNS Abuse Special Interest Group
    TLP:CLEAR