Microsoft Domain Hijacking
Technical risks include dns domain hijacking server hijacking update durations and ddns.
Microsoft domain hijacking. Criminals could use it to steal windows credentials to monitor their movements users and send maliciously archives. There are many hundreds of such. This sort of activity often harms the legitimate domain owner.
Back in 2014 a detectify blog post summed up microsoft s entire dns and misconfiguration issue as something as simple as a forgotten dns entry pointing to something that doesn t exist anymore or never existed like a typo in the dns entry content. The term domain hijacking domain name hijacking domain theft applies to a situation when a malicious party actually takes over the control of a domain name. But two things are new.
Microsoft is taking matters into its own hands when it comes to companies that. What is domain hijacking. First the sheer scale of the exposure.
9 microsoft will enable domain controller enforcement mode by default to address cve 2020 1472. The rightful owner loses control of the domain name in the process. Hundreds of microsoft sub domains open to hijacking march 5 2020 by pierluigi paganini security researchers demonstrated that hundreds of sub domains belonging to microsoft could potentially be hijacked and abused to deliver malware and for phishing attacks.
O connor was afraid to sell the domain as it could be used by malicious people. This process however is the reason why domain hijacking is possible. The ability to impact or modify a dns server s data directly leads to dns compromises.
Although the direct dns risks impact fundamental issues with the protocol technical risks are based on configuration issues. Domain hijacking often involves a fraudulent registrar transfer request or otherwise false change the registration of a domain.