logo
DNS Abuse Techniques Matrix
Domain name compromise
  • English
  • Japanese
Initializing search
    • Index
    • Actions
    • Techniques
      • DGAs
      • Domain name compromise
      • Lame delegations
      • DNS cache poisoning
      • DNS rebinding
      • DNS server compromise
      • Stub resolver hijacking
      • Local recursive resolver hijacking
      • On-path DNS attack
      • DoS against the DNS
      • DNS as a vector for DoS
      • Dynamic DNS resolution (as obfuscation technique)
      • Dynamic DNS resolution: Fast flux (as obfuscation technique)
      • Infiltration and exfiltration via the DNS
      • Malicious registration of (effective) second level domains
      • Creation of malicious subdomains under dynamic DNS providers
      • Compromise of a non-DNS server to conduct abuse
      • Spoofing or otherwise using unregistered domain names
      • Spoofing of a registered domain
      • DNS tunneling - tunneling another protocol over DNS
      • DNS beacons - C2 communication
    • Stakeholders
    • Abuse Matrices

    Domain name compromise

    The wrongfully taking control of a domain name from the rightful name holder. Compromised domains can be used for different kinds of malicious activity like sending spam or phishing, for distributing malware or as botnet command and control - https://www.icann.org/groups/ssac/documents/sac-007-en.

    Previous
    DGAs
    Next
    Lame delegations
    FIRST DNS Abuse Special Interest Group
    TLP:CLEAR