• Home
  • Domains
  • Internet & Tech
  • Security & Privacy
  • Google & Search
  • Editorial Praise
  • Contact

Strategic Revenue - Domain and Internet News

Internet news authored by John Colascione

Register Domain Names

  • Isn’t Print Dead?
  • Killer Acquisition
  • New gTLD Death
  • Online Censorship
  • Gullible Domainers
  • You’re A Loser
You are here: Home / Domain Names / Expired Domains Used by Security Experts to Neutralize Abandoned Web Backdoors

Expired Domains Used by Security Experts to Neutralize Abandoned Web Backdoors

January 9, 2025 By John Colascione Leave a Comment

*** Here Is A List Of Some Of The Best Domain Name Resources Available ***






Cyber Security Experts
Even old email addresses once in use with these domains can be exploited to create various security vulnerabilities.

BATH, UK – More than 4,000 web backdoors that had been abandoned but were still active with live malware were hijacked and their communication infrastructure sinkholed – a term used to describe the process of redirecting malicious traffic to a DNS sinkhole – after web security researchers registered numerous expired domains, preventing them from being used by hackers and cybercriminals.

A backdoor is a covert method of bypassing normal authentication or encryption in a computer, most often used for seizing remote control of a network to gain access to sensitive information such as passwords, to corrupt or delete data on hard drives, or carry out attacks such as delivering malware.

Some of these backdoors were on web servers of well-known and noteworthy entities and organizations – such as the systems of governments and universities – and were ready and waiting to be used for attacks by any threat actors who may have had access to them.

WatchTowr Labs – a group that specializes in offensive security expertise and research – in conjunction with The Shadowserver Foundation – nonprofit internet security organization – acted preemptively to prevent the backdoors in these expired domains from falling into the wrong hands.

Researchers at WatchTowr Labs started an effort to seek out and identify expired domains that could possess backdoors; when these were discovered, the group would register the domains and take control of the backdoor. From there, they would examine the still active malware in an attempt to identify who may have been victimized by it.

WatchTowr registered over 40 domains, and in the process uncovered more than 4,000 systems that had been compromised, including governmental networks in China, Nigeria, Bangladesh, Thailand, and South Korea. These domains were then turned over to The Shadowserver Foundation to manage and sinkhole to prevent them from being used for malicious purposes in the future.

Email Vulnerabilities from Expired Domains

It’s important to recognize that expired domain names pose risks beyond web backdoors. Even old email addresses once in use with these domains can be exploited to create various security vulnerabilities. Cybercriminals can use abandoned email accounts to gain access to old or inactive accounts simply by recreating the old address, potentially leading to unauthorized access to sensitive information, password resets, and/or phishing attacks.

John Colascione 2024
John Colascione

About The Author: John Colascione is Chief Executive Officer of SEARCHEN NETWORKS®. He specializes in Website Monetization, is a Google AdWords Certified Professional, authored a how-to book called ”Mastering Your Website‘, and is a key player in several online businesses.

Filed Under: Domain Names, Privacy Issues, Security Issues Tagged With: Access, Accounts, Active, Address, Attacks, Attempt, Authentication, Backdoor, Backdoors, Backdoors Abandoned, Bangladesh, Bypassing, China, Communication, Compromised, Computer, Conjunction, Control, Corrupt, Covert, Create, Cybercriminals, Data, Delete, Delivering, Discovered, DNS, Domain Names, Domains, Email Addresses, Encryption, Examine, Expertise, Expired, Exploited, Foundation, Governmental, Governments, Group, Hackers, Hard Drives, Hijacked, Identify, Inactive, Information, Infrastructure, Internet, LIVE, Malicious, Malware, Manage, Method, Network, Networks, Nigeria, Nonprofit, Organization, Password, Passwords, Phishing, Possess, Preemptively, Prevent, Recreating, Redirecting, Register, Registered, Remote, Research, Researchers, Resets, Risks, Security, Seizing, Sensitive, Servers, Shadowserver, Sinkhole, Sinkholed, South Korea, Systems, Thailand, Threat Actors, Traffic, Unauthorized, Uncovered, Universities, Victimized, Vulnerabilities, Watchtowr, Watchtowr Labs, Web

*** Here Is A List Of Some Of The Best Domain Name Resources Available ***






Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search This Site

by: John Colascione

John Colascione

Long Island Guide - The Guide to Long Island New York

John Colascione is Chief Executive of SEARCHEN NETWORKS® He specializes in Website Monetization, authored a book called Mastering Your Website, and is a key player in several Internet businesses.

Follow Me

John Colascione Twitter

The First Fiction Horror Story Based Entirely On An Internet Domain Name

The First Fiction Horror Story Based Entirely On An Internet Domain Name
A cyber thriller where the countdown to death is always ticking… Available in Paperback, Kindle and Audiobook.

USED CARS ENTERPRISE

auto buyers market
Auto Buyers Market – Shop Used Cars by Participating Dealers at autobuyersmarket.com

In The News

  • DNJournal: New Book From Veteran Domainer
  • From Brandable to Exact-Match Geo Domain
  • InnovateLI: Two Deals, One Very Interesting Digital
  • Internet Commerce Association: John Colascione
  • NamesCon: Featured Attendee: John Colascione
  • Long Island Media Inc, SmartCEO, Future 50
  • Speakers, Name Summit, John Colascione
  • Speakers, Real Estate Summit, John Colascione
  • 24 Leading Domain Experts Analyze 2017

Popular Stories

Did DuckDuckGo Just Acquire Premium Domain “Duck.com” from Google?

New gTLD? Not So Fast; History Suggests New ‘Right of the Dots’ Could = Total Failure

Could Domain Investing Industry End with Legal Provision for Domain “Hoarding”

Websites and Domain Names to Become Insignificant within 20 Years or Less

Does the Domain Industry Suffer From Own Versions of Trumpted “Fake News” Stories?

Quotes to Follow

quote icon The domain name is equivalent to Gold. It is the only packaged item which is globally tax-free, portable, with value that is universal across different cultures. quote icon – Frank Schilling

quote icon Domains have and will continue to go up in value faster than any other commodity ever known to man. quote icon – Rick Schwartz

quote icon  Google knows you, your friends, your likes, what entertains you, where you are in the world at any given time. Google will soon predict your next action, your next thought, based on a collaboration of thoughts past. quote icon – John Colascione

Like These Headlines?

Enter your email address:

Delivered by FeedBurner

T.L.D. Brokerage

Domain Brokers

From Defense to War: U.S. Government Deploys Bold New “WAR.gov” Domain

WASHINGTON, D.C. - The United States government has begun directing Internet traffic from the long useed Defense.gov - the primary digital home of the Department of Defense for more than two decades - … [Read More...]

Bots, Ad Networks & Fake Lead Form Fills; Phones Don’t Work, Emails Bounce

WEST PALM BEACH, FL –  Have you recently noticed your lead forms being filled out with fake information, phone numbers that don't work and/or email addresses that bounce back? Google's Display Network … [Read More...]

Report: ID Verification Service for Auto Dealers Breach Exposed Millions of Records

SOUTHFIELD, MI - A newly surfaced dark-web listing claims that 700Credit, a provider of credit-reporting and identity-verification services for auto dealers, suffered a substantial data breach in late … [Read More...]

Domaining blog recommended by Domaining.com

Copyright © 2010-2025 StrategicRevenue.com - Property of Internet Marketing Services Inc.   FeedBurner: RSS
By using this site you agree to our Terms of Service and Privacy Policy. If you do not agree, please exit the service.