{"id":6423,"date":"2024-02-24T18:45:06","date_gmt":"2024-02-24T13:15:06","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=6423"},"modified":"2024-03-13T21:39:50","modified_gmt":"2024-03-13T16:09:50","slug":"domain-shadowing","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/","title":{"rendered":"Domain shadowing"},"content":{"rendered":"\n<p>Domain shadowing is a technique listed by MITRE ATT&amp;CK as <a href=\"https:\/\/attack.mitre.org\/techniques\/T1584\/001\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1584.001<\/a> sub-technique of <a href=\"https:\/\/attack.mitre.org\/techniques\/T1584\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1584<\/a> <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"112\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24-at-5.38.34\u202fPM-1024x112.png\" alt=\"MITRE ATT&amp;CK domain shadowing details\" class=\"wp-image-6460\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24-at-5.38.34\u202fPM-1024x112.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24-at-5.38.34\u202fPM-300x33.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24-at-5.38.34\u202fPM-768x84.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24-at-5.38.34\u202fPM-1536x167.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-24-at-5.38.34\u202fPM.png 1670w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 1 &#8211; Domain shadowing as documented by MITRE ATT@CK framework<\/figcaption><\/figure>\n\n\n\n<p>This technique is not to be confused with <a href=\"https:\/\/hackernoon.com\/what-is-subdomain-hijacking-and-how-to-prevent-it-7w1o3ubb\" target=\"_blank\" rel=\"noreferrer noopener\">subdomain hijacking<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-a-domain-shadowing-attack\"><strong>What is a domain shadowing attack?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"766\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/premium_photo-1691784990083-7b952fd43cd6-1024x766.png\" alt=\"Image of an owl hidden, similar notion of a domain shadowing attack\" class=\"wp-image-6467\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/premium_photo-1691784990083-7b952fd43cd6-1024x766.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/premium_photo-1691784990083-7b952fd43cd6-300x225.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/premium_photo-1691784990083-7b952fd43cd6-768x575.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/premium_photo-1691784990083-7b952fd43cd6-1536x1150.png 1536w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/premium_photo-1691784990083-7b952fd43cd6-2048x1533.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Threat actors gain control of the DNS control panel of legitimate domain names by brute force and stealthily insert subdomains pointing to the attackers&#8217; network infrastructure.<\/p>\n\n\n\n<p>The DNS records of the apex domain name are untouched. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-does-domain-shadowing-attack-occur\"><strong>Why does domain shadowing attack occur?<\/strong><\/h2>\n\n\n\n<p>Our hypothesis for the most likely scenario is that the attackers use brute force on the registrants&#8217; domain name control panel. Once successful, stealthy create subdomains under legitimate domain names, which point to the attackers&#8217; infrastructure.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"800\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Domain-shadowing-attack2.png\" alt=\"Representation of domain shadowing attack\" class=\"wp-image-6438\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Domain-shadowing-attack2.png 1000w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Domain-shadowing-attack2-300x240.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Domain-shadowing-attack2-768x614.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Figure 2 &#8211; Representation of domain shadowing attack using example.com domain name<\/figcaption><\/figure>\n\n\n\n<p>Here are the reasons why this attack is possible, <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Weak passwords<\/li>\n\n\n\n<li>2FA is either not available or not enabled<\/li>\n\n\n\n<li>Registrars provide no monitoring\/alerting system to notify when a modification is made to the DNS zone of the domain name.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-threat-actors-perspective\"><strong>Threat actors perspective<\/strong><\/h2>\n\n\n\n<p>Creating and using subdomains under legitimate domain names for malicious purposes, such as phishing, malware, etc, has many benefits from the threat actors&#8217; perspective.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Leveraging domain name reputation <\/strong>&#8211; By using the reputation of the legitimate domain name, threat actors can evade detection <\/li>\n\n\n\n<li><strong>Minimize efforts and time<\/strong> &#8211; Eliminate efforts into buying a domain name(with stolen funds ofcourse!)<\/li>\n<\/ul>\n\n\n\n<p>Shreshta threat intelligence team has been monitoring domain names under gTLDs and ccTLDs using our passive DNS product DNS Watchtower. In the past, we have also documented these attacks&nbsp;<a href=\"https:\/\/shreshtait.com\/blog\/2022\/11\/lk-domain-name\/\" target=\"_blank\" rel=\"noreferrer noopener\">targeting domain names under .LK<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommendations\"><strong>Recommendations<\/strong><\/h2>\n\n\n\n<p>As a domain name registrant, here are a few things that you can do to stop a domain shadowing attack,<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enable 2-factor authentication(2FA)<\/strong> &#8211; If available, enable 2FA in the domain name control panel, which the registrar provides<\/li>\n\n\n\n<li><strong>Password hygiene<\/strong> &#8211; Set a strong and unique password to the domain name control panel <\/li>\n\n\n\n<li><strong>Monitor the DNS records<\/strong> &#8211; Periodically monitor the DNS zone&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Monitoring the DNS records is not feasible for registrants since the registrars provide no alerting\/monitoring feature. Our team has been working in this space. Stay tuned!<\/p>\n\n\n\n<p><strong>Update &#8211; March 13th 2024<\/strong> &#8211; We&#8217;ve published a blog post with the details of <a href=\"https:\/\/shadowfindr.shreshtait.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ShadowFindr<\/a>, a web tool we released last month. <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-shreshta-blog wp-block-embed-shreshta-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"TxpBkiF07J\"><a href=\"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/\">ShadowFindr &#8211; Uncover domain shadowing attacks<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;ShadowFindr &#8211; Uncover domain shadowing attacks&#8221; &#8212; Shreshta Blog\" src=\"https:\/\/shreshtait.com\/blog\/2024\/03\/shadowfindr-uncover-domain-shadowing-attacks\/embed\/#?secret=3BFz1kZlkk#?secret=TxpBkiF07J\" data-secret=\"TxpBkiF07J\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Domain shadowing is a technique listed by MITRE ATT&amp;CK as T1584.001 sub-technique of T1584 This technique is not to be confused with subdomain hijacking What is a domain shadowing attack? Threat actors gain control of the DNS control panel of legitimate domain names by brute force and stealthily insert subdomains pointing to the attackers&#8217; network [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6466,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[43,42],"tags":[45,148],"class_list":["post-6423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dns","category-threat-intelligence","tag-dns","tag-domain-shadowing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"Domain shadowing is a technique wherein threat actors stealthily insert subdomains pointing to the attackers&#039; network infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Domain shadowing\" \/>\n<meta property=\"og:description\" content=\"Domain shadowing is a technique wherein threat actors stealthily insert subdomains pointing to the attackers&#039; network infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-24T13:15:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-13T16:09:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"Domain shadowing\",\"datePublished\":\"2024-02-24T13:15:06+00:00\",\"dateModified\":\"2024-03-13T16:09:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/\"},\"wordCount\":393,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"keywords\":[\"dns\",\"domain shadowing\"],\"articleSection\":[\"DNS\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"datePublished\":\"2024-02-24T13:15:06+00:00\",\"dateModified\":\"2024-03-13T16:09:50+00:00\",\"description\":\"Domain shadowing is a technique wherein threat actors stealthily insert subdomains pointing to the attackers' network infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg\",\"width\":2560,\"height\":1706,\"caption\":\"Image of an owl hidden in a tree, notion is very similar to a domain shadowing attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/domain-shadowing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Domain shadowing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"},\"sameAs\":[\"https:\\\/\\\/shreshtait.com\\\/blog\"],\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/author\\\/pswapneel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"Domain shadowing is a technique wherein threat actors stealthily insert subdomains pointing to the attackers' network infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/","og_locale":"en_US","og_type":"article","og_title":"Domain shadowing","og_description":"Domain shadowing is a technique wherein threat actors stealthily insert subdomains pointing to the attackers' network infrastructure.","og_url":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2024-02-24T13:15:06+00:00","article_modified_time":"2024-03-13T16:09:50+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"Domain shadowing","datePublished":"2024-02-24T13:15:06+00:00","dateModified":"2024-03-13T16:09:50+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/"},"wordCount":393,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","keywords":["dns","domain shadowing"],"articleSection":["DNS","Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/","url":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","datePublished":"2024-02-24T13:15:06+00:00","dateModified":"2024-03-13T16:09:50+00:00","description":"Domain shadowing is a technique wherein threat actors stealthily insert subdomains pointing to the attackers' network infrastructure.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/hans-veth-YXUopi5p-bc-unsplash-scaled.jpg","width":2560,"height":1706,"caption":"Image of an owl hidden in a tree, notion is very similar to a domain shadowing attack"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Domain shadowing"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},{"@type":"Person","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"},"sameAs":["https:\/\/shreshtait.com\/blog"],"url":"https:\/\/shreshtait.com\/blog\/author\/pswapneel\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=6423"}],"version-history":[{"count":50,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6423\/revisions"}],"predecessor-version":[{"id":6708,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6423\/revisions\/6708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/6466"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=6423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=6423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=6423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}