Back to all posts

How Domain Hijacking Actually Happens: Five Attack Paths and the Controls That Stop Them

A practical walk-through of the five ways attackers actually take over domains in the real world—social engineering, registrar account compromise, DNS provider takeover, NS hijacks, and expired-domain reclamation—and the specific controls that block each one.

Published on May 20, 2026By Namefi Team
  • security
  • domains
  • registrar
  • incident-response

"Domain hijacking" is one of those phrases that sounds dramatic but means very different things depending on how it happens. A registrar account taken over by a phishing email is a hijack. A nameserver record quietly swapped at a DNS provider is a hijack. An expired domain that someone else grabs and re-points is, in a sense, also a hijack.

In every case, the result is the same: someone else is now telling the world where your name points. Email, payments, login flows, and SaaS integrations all start sending traffic to the attacker. Recovery often takes days, sometimes weeks. If the domain was transferred to another registrar, ICANN's Transfer Dispute Resolution Policy (TDRP) may be relevant; other cases often require registrar escalation, registry escalation, platform recovery, or a court order. The fastest fix is to never get into that position in the first place.

This post walks through the five attack paths we see most often, what each one looks like from the defender's side, and the specific controls that actually stop it.

1. Social engineering against the registrar's support team

The most common high-profile hijacks of the last decade did not involve any technical exploit. They involved a phone call.

The pattern: an attacker collects enough information about a target—WHOIS history, LinkedIn, leaked password dumps, social media—and then calls or emails the registrar's support team impersonating the owner. They ask for a password reset, an email change, or a transfer auth code. If the support agent runs a checklist that the attacker has prepared for, the account changes hands.

This was the mechanism behind several of the most damaging hijacks involving cryptocurrency exchanges, ad platforms, and infrastructure brands. It does not require any vulnerability in the registrar's code; it exploits the human in the loop.

What stops it:

  • A hard registrar-side rule that ownership changes require either a notarized document or a multi-factor challenge against the registrant's existing channel.
  • Registry lock (separate from registrar lock), where the registry operator itself refuses to act on transfer or contact changes without an out-of-band confirmation. Available on .com, .net, and many ccTLDs.
  • Verifying which registrar you actually use and removing the others. Brands that started in 2007 often have stale accounts at three or four registrars with weak credentials.

2. Registrar account compromise (the credential path)

The technical cousin of social engineering. The attacker phishes the registrar account credentials, or finds them in a credential-stuffing dump, and logs in directly. From there they unlock the domain, change the contact email, and request a transfer.

What stops it:

  • Phishing-resistant 2FA on the registrar account. TOTP via authenticator app is the floor; hardware keys (WebAuthn / FIDO2) are the ceiling. SMS-based 2FA is not sufficient—SIM-swapping attacks have repeatedly defeated it. The U.S. government's CISA guidance explicitly recommends moving off SMS.
  • A registrar that supports per-domain locks in addition to per-account locks, so a single account compromise cannot unlock everything at once.
  • Audit trail and alerting on contact changes, nameserver changes, and transfer requests. The attacker's first move is to silence those alerts; if they fire to a channel the attacker does not control, you get warning time.

3. DNS provider takeover

Even if the registrar account is locked down, the name servers that the registrar publishes might point to a DNS provider with a separate account—Cloudflare, Route 53, NS1, DNSimple, your own BIND server. If the attacker gets into that DNS account, they do not need to touch the registrar. They just rewrite the A, MX, and TXT records and traffic follows.

This is often the easier path for attackers, because brands invest in registrar security but treat the DNS provider as "infrastructure" with weaker controls.

What stops it:

  • The same 2FA rigor on the DNS provider account as on the registrar. Treat it as equally sensitive. It is.
  • DNSSEC, signed at the zone level. DNSSEC does not prevent a DNS provider account compromise: if an attacker can publish records through the provider and the provider signs them with the zone's active keys, validating resolvers will treat those answers as authentic. What DNSSEC does block is in-path tampering, cache poisoning, and forged answers that are unsigned or wrongly signed, assuming the parent publishes the correct DS records. See RFC 4033-4035 for the protocol details.
  • Multi-provider DNS with separate accounts and credentials, using multi-signer DNSSEC. This helps with availability and provider isolation, but it only works if every provider serves the intended zone data and the DNSKEY/DS sets are coordinated correctly. It is not a magic override where resolvers automatically prefer the uncompromised provider.

4. Nameserver hijacks via stale delegations and dangling records

A subtler variant: the domain itself is fine, but a subdomain points (via CNAME or NS record) at a third-party service that the original owner no longer controls. The attacker registers the resource on the third-party side and now answers for the subdomain.

Examples:

  • A subdomain CNAMEd to an old Heroku, S3, or Azure asset that has been released. The attacker re-claims that asset name and gets a valid TLS cert.
  • A delegated NS record pointing at a DNS provider account that has been deleted. The attacker creates a fresh account using that exact host pattern and serves whatever records they want for the subdomain.

These are catalogued under the umbrella term dangling DNS, and they are the most common form of "real" domain hijacks on the open web today because most large organizations have hundreds or thousands of subdomains and only audit a fraction of them.

What stops it:

  • A complete inventory of every NS, CNAME, and ALIAS record in every zone you own, with an owner for each.
  • Automated dangling-DNS scanners that re-resolve every record on a schedule and flag the ones pointing at third-party services that no longer respond. GitHub's blog and Detectify Labs have long-running write-ups of this attack class.
  • Decommissioning records the same day you decommission the underlying service.

5. Expired-domain reclamation

The simplest and least sympathetic attack: the registrant forgot to renew. The grace period passes. The domain drops back into the pool. Someone else registers it.

This sounds like an operational failure, not a security incident, but the impact is identical—someone else now controls the name, and all of the trust signals that were built up over years (SPF, DKIM, OAuth callbacks, password reset emails, payment integrations) start flowing to a stranger. Several public incidents involved attackers buying expired domains specifically because the previous owner had registered them as the iss claim in OAuth tokens or as the sender for transactional email.

What stops it:

  • Multi-year renewal (5-10 years) on any domain that touches authentication, payments, or production traffic. The cost is trivial; the protection is significant.
  • Auto-renewal with a payment method that cannot silently fail. Card expirations are the single most common cause of accidental expiry.
  • Calendar reminders at 90, 60, 30, and 7 days that fire to a team address, not the inbox of one person who might leave the company.

What good looks like

Pulling the controls together, the baseline for any domain that matters looks like this:

ControlBlocks attack path
Hardware-key 2FA on registrarAccount compromise (path 2)
Hardware-key 2FA on DNS providerDNS takeover (path 3)
Registry lock (where available)Social engineering (path 1)
DNSSEC signed at the zoneDNS in-path tampering and forged answers
Subdomain inventory + dangling scannerSubdomain hijack (path 4)
5-10 year renewal + auto-renewAccidental expiry (path 5)
Alerts on contact/NS/transfer changesAll five (you learn early)

If you are responsible for a domain and you cannot tick every row, the attacker's job is materially easier.

How Namefi changes the picture

Most of the controls above exist as features at one registrar, one DNS provider, or one workflow tool, and the security depends on whichever account is weakest. Namefi tokenizes the registrant relationship on-chain, which means the authoritative record of who owns this name lives outside any single registrar's customer database. A support agent at any one provider cannot quietly change ownership without a signed transaction the rightful owner has to approve. The registrar still operates the technical delegation, but the control layer is moved into a place where social engineering does not work.

That is not a complete substitute for the controls in the table above—you still need DNSSEC, you still need 2FA on the DNS provider, you still need to renew. But it removes the single most common high-impact hijack vector (path 1) from the threat model entirely.

Sources and further reading

About the author(s)

Namefi Team
Namefi Team • Namefi

Namefi is a collective of engineers, designers, and operators who obsess over building tools that make managing your onchain domain names effortless.