We manage your Domain Names
Vulnerabilities check list
What are the vulnerabilities that should be addressed ?
1. All an attacker needs to gain control of an organization’s entire domain name portfolio (and to hamper authorized access to that portfolio) is a user account and password.
2. Attackers need only guess, phish, or apply social engineering techniques on a single point of contact to gain control of a domain registration account.
3. Attackers scan domain account registration and administration portals for web application vulnerabilities (e.g., SQL injection). A successful exploit of vulnerable application code can result in the disclosure of account credentials for many domain accounts.
4. Email is the preferred and often the only method by which some registrars attempt to notify a registrant of account activity.
5. Attackers can block delivery of email notifications to targeted registrants by altering DNS configuration information so that email notifications will not be to any recipient in the domains the attacker controls through a compromised account (e.g., registrant’s identified administrative or technical contact email addresses hosted in the domain).
6. Access to and the ability to modify contact and DNS configuration information for all the domains in a registration account is commonly granted through a single user account and password.
7. Even when unauthorized modification of DNS information is discovered quickly, the process of restoring DNS information to correct for a malicious configuration can be a lengthy one that is inherent in the distributed nature of the DNS and related to time to live (TTL) values.
Next : Securing a portfolio