Changes

Jump to navigation Jump to search
Line 25: Line 25:  
*Conducting [[phishing]] attacks that trick registrants into revealing login information to try and take control of the domain.
 
*Conducting [[phishing]] attacks that trick registrants into revealing login information to try and take control of the domain.
 
*Convincing you via fraudulent means to buy a domain name under a different top-level domain name at a higher price.<ref>[https://www.icann.org/en/system/files/files/help-keep-domain-name-secure-30sep20-en.pdf Domain Name Security, ICANN Org]</ref>
 
*Convincing you via fraudulent means to buy a domain name under a different top-level domain name at a higher price.<ref>[https://www.icann.org/en/system/files/files/help-keep-domain-name-secure-30sep20-en.pdf Domain Name Security, ICANN Org]</ref>
===Compromised Domains===
+
===[[Compromised Domains]]===
 
+
A compromised website indicates that a [[Threat Actor]] has control over the website and is not the official registrant of the domain itself. A domain name that has been registered for a legitimate or benign purpose but whose website has been compromised will generally have:
 +
* viewable content related to the domain name,
 +
* been renewed or registered for longer than 1 year, and
 +
* a content management system (like Wordpress) that is visible in the URL.<ref>[https://dnsabuseinstitute.org/best-practices-identification-mitigation-of-dns-abuse/ Best practices for Identifying and Mitigating DNS Abuse, DNS Abuse Institute]</ref>
    
==References==
 
==References==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits

Navigation menu