Co-Founder/Partner @CoastlineCyber
https://leanpub.com/internal-field-guide
I'm adding radar.defendflow.xyz to my toolset going forward. Interesting tool and I learned something today.
I'm adding radar.defendflow.xyz to my toolset going forward. Interesting tool and I learned something today.
Common scenarios:
- Migrated DNS providers, forgot to update registrar
- Nameserver decommissioned by old provider
- Company merged/acquired, DNS lost in transition
- "Set it and forget it" mindset from 10+ years ago
It's technical debt.
Common scenarios:
- Migrated DNS providers, forgot to update registrar
- Nameserver decommissioned by old provider
- Company merged/acquired, DNS lost in transition
- "Set it and forget it" mindset from 10+ years ago
It's technical debt.
If your domain has an active Azure AD tenant (most businesses do), hijacking DNS lets attackers:
- Access OpenID configurations
- Exploit device code flows
- Potentially compromise admin consent endpoints
Your cloud identity lives here.
If your domain has an active Azure AD tenant (most businesses do), hijacking DNS lets attackers:
- Access OpenID configurations
- Exploit device code flows
- Potentially compromise admin consent endpoints
Your cloud identity lives here.
✗ Host phishing sites on YOUR trusted domain
✗ Intercept emails (if DNS MX records changed)
✗ Steal OAuth tokens from M365 integrations
✗ Damage brand reputation
✗ Launch supply chain attacks against your customers
✗ Host phishing sites on YOUR trusted domain
✗ Intercept emails (if DNS MX records changed)
✗ Steal OAuth tokens from M365 integrations
✗ Damage brand reputation
✗ Launch supply chain attacks against your customers
kickasstorrentsso.com (variation of KickassTorrents)
yandex.ua (Ukrainian domain for Yandex)
hi-pda.com (Popular Chinese tech forum)
kickasstorrentsso.com (variation of KickassTorrents)
yandex.ua (Ukrainian domain for Yandex)
hi-pda.com (Popular Chinese tech forum)
Domain: bale.com worth $$$
Assets at risk: Microsoft 365 tenant, and various OAuth endpoints
Time to exploit: Minutes, not hours
Domain: bale.com worth $$$
Assets at risk: Microsoft 365 tenant, and various OAuth endpoints
Time to exploit: Minutes, not hours
I found domains that have been on the WWW since the early days. Legacy domains. Established brands. Some with active Microsoft 365 tenants, email systems, and OAuth integrations still running.
These aren't abandoned sites. They're ACTIVE businesses.
I found domains that have been on the WWW since the early days. Legacy domains. Established brands. Some with active Microsoft 365 tenants, email systems, and OAuth integrations still running.
These aren't abandoned sites. They're ACTIVE businesses.
- No password needed
- No account takeover required
- No social engineering
- The domain registrar shows YOU still own it
- But attackers control where traffic goes
- No password needed
- No account takeover required
- No social engineering
- The domain registrar shows YOU still own it
- But attackers control where traffic goes
It's when a domain's DNS is misconfigured specifically "lame delegation" where the nameservers at your registrar don't match your DNS provider. This allows an attacker can claim your domain at the DNS level without touching your registrar.
It's when a domain's DNS is misconfigured specifically "lame delegation" where the nameservers at your registrar don't match your DNS provider. This allows an attacker can claim your domain at the DNS level without touching your registrar.