Cybercriminal “Sitting Ducks” Attack Hijacks 35,000 Domains: How to Protect Yours
Threat actors have hijacked over 35,000 domains via Sitting Ducks attacks, exploiting DNS configuration flaws and weak ownership verification. Researchers warn that millions of domains are vulnerable daily, with Russian cybercriminal groups leveraging these for spam, scams, and malware. Regularly reviewing DNS configurations can help prevent such hijacks.

Hot Take:
Who knew that owning a domain could feel like sitting on a duck waiting to be hijacked by cybercriminals? Apparently, even the web’s landlords need more than just a fancy address to keep the riff-raff out. Time to double-check those DNS settings before your domain ends up quacking for the wrong team!
Key Points:
- More than 35,000 domains hijacked through Sitting Ducks attacks.
- Attack vector exploits registrar and DNS provider configuration flaws.
- Russian cybercriminal groups have been using this method for years.
- Infoblox and Eclypsium researchers identified over a million vulnerable domains.
- Registrars and DNS providers need to tighten security protocols to prevent these attacks.
Already a member? Log in here