Paul Seekamp's Avatar

Paul Seekamp

@nullenc0de.bsky.social

I spend a significant amount of time reading security stuff. Co-Founder/Partner @CoastlineCyber https://leanpub.com/internal-field-guide

83 Followers  |  33 Following  |  11 Posts  |  Joined: 13.11.2024  |  1.9004

Latest posts by nullenc0de.bsky.social on Bluesky

SecurityLens - Stop Threats Before They Start

DNS is always a buzzword but security teams rarely know the threats. Glad to see all the checks in one place.

I'm adding radar.defendflow.xyz to my toolset going forward. Interesting tool and I learned something today.

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Why does this happen?

Common scenarios:

- Migrated DNS providers, forgot to update registrar
- Nameserver decommissioned by old provider
- Company merged/acquired, DNS lost in transition
- "Set it and forget it" mindset from 10+ years ago

It's technical debt.

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

The M365 angle is particularly nasty.
If your domain has an active Azure AD tenant (most businesses do), hijacking DNS lets attackers:

- Access OpenID configurations
- Exploit device code flows
- Potentially compromise admin consent endpoints

Your cloud identity lives here.

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

What can attackers do with a hijacked domain?
βœ— Host phishing sites on YOUR trusted domain
βœ— Intercept emails (if DNS MX records changed)
βœ— Steal OAuth tokens from M365 integrations
βœ— Damage brand reputation
βœ— Launch supply chain attacks against your customers

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Some notable (interesting) vulnerable domains from the test:

kickasstorrentsso.com (variation of KickassTorrents)
yandex.ua (Ukrainian domain for Yandex)
hi-pda.com (Popular Chinese tech forum)

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Here is a domain that looks to be already compromised.

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Some examples:

Domain: bale.com worth $$$
Assets at risk: Microsoft 365 tenant, and various OAuth endpoints
Time to exploit: Minutes, not hours

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

The scope? Eye-opening.

I found domains that have been on the WWW since the early days. Legacy domains. Established brands. Some with active Microsoft 365 tenants, email systems, and OAuth integrations still running.

These aren't abandoned sites. They're ACTIVE businesses.

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Here's what makes this terrifying:

- No password needed
- No account takeover required
- No social engineering
- The domain registrar shows YOU still own it
- But attackers control where traffic goes

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

What's a Sitting Duck attack?

It's when a domain's DNS is misconfigured specifically "lame delegation" where the nameservers at your registrar don't match your DNS provider. This allows an attacker can claim your domain at the DNS level without touching your registrar.

30.10.2025 02:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I just scanned top 100k Alexa domains and found something alarming.

Some of the internet's most valuable domains worth hundreds of thousands of dollars can be hijacked in minutes through "Sitting Duck" attacks.

Here's how:

30.10.2025 02:39 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@nullenc0de is following 19 prominent accounts