We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
Domain Threats
A high level overview of domain threat landscape

Overview
Successfully accessing domain names over the internet requires the coordination and cooperation of various independent parties, spanning the entire globe: from domain registrars, to DNS providers, certificate authorities and cloud providers.
Cyber attackers can independently and silently target the parties involved in servicing the internet traffic, and preventing sophisticated domain attacks requires robust security measures and continuous monitoring to defend against domain-related cyber threats.

What are the Parties Involved
The Domain Registrar
A domain name registrar is a company that manages the reservation of Internet domain names. A domain name registrar must be accredited by a top-level domain (TLD) registry, such as Verisign for the .com and .net TLDs, and must follow the registry's policies and procedures for registering and managing domain names.>
The registrar is responsible for maintaining a database of all registered domain names and their associated information, such as the name servers that are used to host the domain's website and email services. The registrar is also responsible for ensuring that the information in the database is accurate and up to date.>
The DNS Provider
A DNS (Domain Name System) provider is a service that provides the infrastructure for resolving domain names to IP addresses. The DNS provider operates a network of servers that are used to translate human-readable domain names into IP addresses, which are used to locate and connect to websites and other online services.
A DNS provider plays a critical role in the performance of a domain, as it is responsible for resolving domain names to IP addresses in a fast and reliable manner.
The Certificate Authority
An SSL/TLS certificate is a type of digital certificate that is used to establish a secure connection between a user's browser and a website.
A certificate authority (CA) is an entity that issues digital certificates, which are used to establish trust for secure online transactions. In the context of domains, a certificate authority issues SSL/TLS certificates that are used to secure websites and other online services.
The Cloud Provider
A cloud provider is a company that offers cloud computing services, typically over the internet. These services include the delivery of computing resources such as servers, storage, and databases, as well as various applications and services. Customers can access these resources and services on-demand, without the need for upfront investments in hardware or software.

What Can Go Wrong
reg Layer
-
Domain Registar Compromise
-
A domain registrar can be compromised, and there are several ways this can occur:
-
Insider threat: An attacker with access to the internal network of a domain registrar can compromise the registrar's systems, steal sensitive information, and manipulate domain registrations.
-
Hacking: An attacker can gain unauthorized access to the systems of a domain registrar by exploiting vulnerabilities in the registrar's software or hardware.
-
Phishing: Attackers can trick employees of a domain registrar into disclosing their login credentials, which can then be used to compromise the registrar's systems.
-
Social engineering: Attackers can use social engineering tactics, such as pretexting, baiting, and tailgating, to gain access to the systems of a domain registrar.
-
Supply chain attack: An attacker can compromise the systems of a domain registrar by attacking a third-party supplier or partner that has access to the registrar's systems. If a domain registrar is compromised, an attacker can manipulate domain registrations, redirect traffic, and steal sensitive information, among other things.
-
-
Domain Registration Expiration
-
If your domain expires and is now renewed, it may become available for registration by someone else. If someone else registers the domain after it has expired, they will obtain full control over the domain and can use it for their own purposes.
-
dns Layer
-
DNS Provider Compromise
-
A DNS provider is prone to cyber attacks just like any other organization, and there are several ways a DNS provider can be compromised:
-
DDoS attacks: A DNS provider can be targeted by a DDoS (Distributed Denial of Service) attack, which is an attack that aims to disrupt the availability of a website or online service by overwhelming the target with a large amount of traffic. If a DNS provider is hit by a DDoS attack, this can result in slow or unavailable domain name resolution, and can also cause websites to be unavailable.
-
Hacking: An attacker can gain unauthorized access to the systems of a DNS provider by exploiting vulnerabilities in the provider's software or hardware. If a DNS provider is hacked, an attacker can manipulate domain name resolution, redirect traffic, and steal sensitive information, among other things.
-
Phishing: Attackers can trick employees of a DNS provider into disclosing their login credentials, which can then be used to compromise the provider's systems.
-
Social engineering: Attackers can use social engineering tactics, such as pretexting, baiting, and tailgating, to gain access to the systems of a DNS provider.
-
Supply chain attack: An attacker can compromise the systems of a DNS provider by attacking a third-party supplier or partner that has access to the provider's systems.
-
-
Domain Record Hijacking
-
DNS record hijacking is a type of cyber attack where an attacker changes the DNS records for a particular domain to redirect traffic from the intended location to a different, malicious location. The attacker can do this by compromising a domain registrar account, exploiting a vulnerability in a DNS server, or using social engineering tactics to trick the domain owner into making the changes.
-
ssl Layer
-
Certificate Authority Compromise
-
There are several ways a certificate authority (CA) could be compromised, including, but not limited to:
-
Insider threat: An attacker with access to the internal network of a CA can compromise the CA's systems, steal sensitive information, and issue fraudulent certificates.
-
Hacking: An attacker can gain unauthorized access to the systems of a CA by exploiting vulnerabilities in the CA's software or hardware.
-
Phishing: Attackers can trick employees of a CA into disclosing their login credentials, which can then be used to compromise the CA's systems.
-
Social engineering: Attackers can use social engineering tactics, such as pretexting, baiting, and tailgating, to gain access to the systems of a CA.
-
Supply chain attack: An attacker can compromise the systems of a CA by attacking a third-party supplier or partner that has access to the CA's systems. Once a CA is compromised, an attacker can issue fraudulent certificates, which can be used to conduct man-in-the-middle attacks, steal sensitive information, and impersonate websites, among other things.
-
-
Certificate Hijacking
-
SSL certificate hijacking, also known as SSL spoofing or SSL theft, is a type of cyber attack where an attacker gains unauthorized access to an SSL certificate. By hijacking the SSL certificate, the attacker can use it to set up a fake website or phishing page that appears to be legitimate, allowing them to steal sensitive information such as passwords and financial data.
The attack can occur through various means, including exploiting vulnerabilities in the certificate management process, compromising a certificate authority's infrastructure, or using social engineering tactics to trick certificate authorities into issuing a certificate for the attacker's domain.
-
cld Layer
-
Cloud Provider Compromise
-
Given their size and complexity, cloud providers can be subjected to cyber attacks, just like any other type of organization.
-
There are several ways that a cloud provider could be compromised:
-
Account hacking: Attackers could try to gain access to a customer's cloud account by stealing their login credentials or exploiting vulnerabilities in the cloud provider's login process.
-
Malicious insiders: Insiders with malicious intent, such as employees or contractors of the cloud provider, could access and steal sensitive customer data.
-
Infrastructure vulnerabilities: Attackers could exploit vulnerabilities in the cloud provider's infrastructure, such as its servers, storage, or databases, to access and steal customer data.
-
DDoS attacks: Cloud providers could be targeted by DDoS (Distributed Denial of Service) attacks, which aim to make a website or online service unavailable by overwhelming it with traffic. This could result in customers being unable to access their cloud resources.
-
Data breaches: Attackers could steal customer data by compromising a cloud provider's backups, backups of backups, or data archives.
-