DNS Hijacking (DNS Hijacking)
The Importance of DNS Hijacking
DNS hijacking is particularly dangerous because it is invisible to the user. The browser shows the correct domain name in the address bar, but the actual server is controlled by the attacker. Combined with a fraudulent SSL certificate (from a compromised CA or a CA that does not check CAA records), the attack can be completely transparent.
Common attack vectors include compromising the domain's registrar account (to change NS records), exploiting vulnerabilities in home routers (to redirect DNS to attacker-controlled servers), and poisoning the cache of recursive resolvers. BGP hijacking can also redirect DNS traffic at the network level.
Defenses include DNSSEC (which validates DNS responses cryptographically), registrar lock (which prevents unauthorized NS record changes), CAA records (which limit certificate issuance), and Certificate Transparency monitoring (which detects fraudulent certificates). Two-factor authentication on your registrar account is one of the most important protections.
How to Test for DNS Hijacking
Monitor your DNS records regularly with a DNS health checker to detect unauthorized changes. Enable DNSSEC to prevent DNS spoofing. Set up Certificate Transparency monitoring to detect fraudulent certificates. Enable registrar lock and two-factor authentication on your registrar account.