
Domain hijacking is the unauthorised transfer or takeover of a domain name. When it happens, the attacker gains control over everything tied to that domain — your website, email, subdomains, and SSL certificates. Recovery is slow, expensive, and sometimes impossible.
The good news: most domain hijacking is preventable with a small number of well-configured security settings at your registrar.
Understanding the attack vectors helps you prioritise defences:
Registrar account compromise — The most common vector. An attacker gains access to your registrar account (via phishing, password reuse, or weak credentials) and makes direct changes. Once inside, they can change nameservers, initiate a transfer, or modify WHOIS contact details.
Social engineering the registrar — The attacker contacts the registrar's support team, impersonates the domain owner, and convinces support to make account changes or initiate a transfer. Weak identity verification processes at some registrars make this possible.
WHOIS contact takeover — The attacker first takes over the email address listed in your WHOIS record. Transfer authorisation emails go to that address. Domain transfer proceeds without the real owner knowing.
Domain expiry — Expired domains are available for anyone to register. If your renewal fails and you miss the grace period, an attacker can register your domain. This isn't traditional hijacking but has the same outcome. See why domain auto-renew fails for the renewal failure scenarios.
This is the single most impactful action. Even if an attacker has your password, 2FA prevents them from logging in.
Most major registrars support authenticator apps (Google Authenticator, Authy) or hardware keys (YubiKey). SMS-based 2FA is better than nothing but is vulnerable to SIM swapping. Use an authenticator app or hardware key.
Check your registrar's security settings and enable 2FA if it isn't already active.
Enable both clientTransferProhibited and clientUpdateProhibited in your registrar's domain settings. This prevents transfers and nameserver changes without explicit unlocking.
For high-value domains, ask your registrar about registry lock — a stronger lock applied at the TLD registry level that requires manual verification to remove. See registrar lock vs transfer lock for the full explanation.
# Verify lock status
whois yourdomain.com | grep "Domain Status"
# You want to see: clientTransferProhibited, clientUpdateProhibited
The email address on your registrar account is the key to that account. If an attacker compromises that email, they can reset your registrar password.
Use a dedicated email address for your domain registrar that's:
WHOIS privacy (also called Domain Privacy or Registrant Privacy) replaces your personal or company contact details in the public WHOIS record with the registrar's proxy contact information. This prevents attackers from:
Most registrars offer WHOIS privacy for free or as a low-cost add-on. ICANN's WHOIS information page covers data accuracy requirements.
Registrar accounts are a high-value target. Use a password manager and generate a unique, strong password specifically for your registrar account. Don't reuse passwords from other services.
If the email address in your WHOIS record is outdated (former employee, closed mailbox), transfer authorisation emails go undelivered — and attackers can potentially use the abandoned email. Keep your WHOIS contacts current.
Even with all the above in place, monitoring gives you early warning if something changes. An unexpected nameserver change is the clearest signal of a hijacking attempt in progress.
Act immediately — time matters.
Recovery isn't guaranteed, and can take weeks. Prevention is far cheaper.
Domain Monitor continuously monitors your domain's DNS records and nameservers. An unauthorised nameserver change — the first step in most hijacking attempts — triggers an immediate alert. Create a free account and add DNS monitoring for every domain you own or manage.
See what is domain hijacking for background on the threat, and how to monitor nameserver changes across client domains for the monitoring approach.
Wildcard, SAN (multi-domain), and single-domain SSL certificates cover different use cases. Here's a clear comparison to help you pick the right type — and avoid paying for coverage you don't need.
Read moreDNS resolves correctly from your office but fails for users in other countries or on different ISPs. Here's why geographic DNS inconsistency happens and how to diagnose which layer is causing it.
Read moreRegistrar lock and transfer lock are often confused — and disabling the wrong one leaves your domain vulnerable. Here's a clear breakdown of what each does and when to use them.
Read moreLooking to monitor your website and domains? Join our platform and start today.