Overview

Security researchers demonstrated how abandoned infrastructure enabled the hijacking of 4,000+ web backdoors through the registration of 40+ expired domains for just minimal investment of $20 per domain. The operation exposed critical vulnerabilities

Whom it may concern

  • Government cybersecurity teams
  • Academic institution IT departments
  • Domain registration authorities
  • Security operations teams

Key Findings

  1. Compromised systems included institutions from Bangladesh, China, Nigeria, South Korea, and Thailand
  1. Successfully sinkholed malicious domains in partnership with Shadowserver Foundation
  1. Identified multiple backdoor variants:
* Simple PHP web shells
* c99shell
* r57shell
* China Chopper

Risk Analysis

  • Critical exposure of government and academic systems
  • Probability: High (demonstrated successful exploitation)
  • Impact: Severe (potential unauthorized system access)
  • Attack complexity: Low (minimal cost and technical barriers)

Action Items

  • Implement domain expiration monitoring
  • Deploy web shell detection systems
  • Establish infrastructure decommissioning protocols
  • Conduct regular domain inventory audits

Sources

  • [The Hacker News](https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html)
Share this article

Stay up to date

Join my community and receive the latest risk news and trends.