Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain
Cybersecurity experts have identified a growing threat vector where attackers exploit improperly configured or abandoned DNS records to hijack organizational subdomains. These “Dangling DNS” attacks occur when DNS records, particularly canonical name (CNAME) records, point to resources that no longer exist or have been deprovisioned, creating an opportunity for attackers to register and control these […] The post Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain appeared first on Cyber Security News.

Cybersecurity experts have identified a growing threat vector where attackers exploit improperly configured or abandoned DNS records to hijack organizational subdomains.
These “Dangling DNS” attacks occur when DNS records, particularly canonical name (CNAME) records, point to resources that no longer exist or have been deprovisioned, creating an opportunity for attackers to register and control these subdomains for malicious purposes.
The vulnerability typically manifests when organizations migrate services, discontinue SaaS subscriptions, or decommission cloud resources without properly updating their DNS configurations.
For instance, if a company stops using Zendesk for customer support but fails to remove the CNAME record pointing support.YourBiz.com to YourBiz.zendesk.com, attackers can register the abandoned Zendesk subdomain and gain control over it.
SentinelOne researchers identified over 1,250 instances of subdomain takeover risks related to deprovisioned cloud resources in the past year alone.
These vulnerabilities are particularly concerning when they affect assets that serve as part of software supply chains, potentially transforming a simple configuration oversight into a devastating supply chain attack.
“What makes these attacks particularly insidious is that they exploit trust relationships that have been previously established,” noted SentinelOne researchers in their April 2025 analysis.
“When users or systems continue to request resources from what they believe are legitimate organizational subdomains, they’re actually connecting to attacker-controlled infrastructure.”
A common example involves cloud storage services like AWS S3 buckets.
.webp)
When a bucket used to host content on a subdomain is deleted but its DNS record remains, it creates a perfect attack opportunity. Consider the following scenario:-
support.YourBiz.com. 3600 IN CNAME YourBiz.zendesk.com.
When the zendesk account is abandoned but the DNS record remains, visitors to support.YourBiz.com may encounter error messages indicating the resource is unavailable.
.webp)
However, attackers who register that same Zendesk subdomain can now control content served through the legitimate organizational domain.
The danger escalates substantially when these subdomains are used for delivering software components or updates.
In a recent investigation spanning from October 2024 to January 2025, security researchers discovered approximately 150 deleted S3 buckets that received over 8 million requests for container images, software updates, and even VPN configurations.
Had attackers controlled these resources, they could have distributed malicious code through trusted channels.
The distinctive error message from a missing AWS S3 bucket, a key indicator of subdomain takeover vulnerability.
Organizations can protect themselves by implementing regular DNS auditing, promptly removing stale DNS records, and deploying runtime security to detect unexpected behavior even when prevention fails.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Also Read:
The post Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain appeared first on Cyber Security News.