
Domain hijacking is the unauthorised transfer or takeover of a domain name. When it happens, the attacker gains control over everything tied to that domain — your website, email, subdomains, and SSL certificates. Recovery is slow, expensive, and sometimes impossible.
The good news: most domain hijacking is preventable with a small number of well-configured security settings at your registrar.
Understanding the attack vectors helps you prioritise defences:
Registrar account compromise — The most common vector. An attacker gains access to your registrar account (via phishing, password reuse, or weak credentials) and makes direct changes. Once inside, they can change nameservers, initiate a transfer, or modify WHOIS contact details.
Social engineering the registrar — The attacker contacts the registrar's support team, impersonates the domain owner, and convinces support to make account changes or initiate a transfer. Weak identity verification processes at some registrars make this possible.
WHOIS contact takeover — The attacker first takes over the email address listed in your WHOIS record. Transfer authorisation emails go to that address. Domain transfer proceeds without the real owner knowing.
Domain expiry — Expired domains are available for anyone to register. If your renewal fails and you miss the grace period, an attacker can register your domain. This isn't traditional hijacking but has the same outcome. See why domain auto-renew fails for the renewal failure scenarios.
This is the single most impactful action. Even if an attacker has your password, 2FA prevents them from logging in.
Most major registrars support authenticator apps (Google Authenticator, Authy) or hardware keys (YubiKey). SMS-based 2FA is better than nothing but is vulnerable to SIM swapping. Use an authenticator app or hardware key.
Check your registrar's security settings and enable 2FA if it isn't already active.
Enable both clientTransferProhibited and clientUpdateProhibited in your registrar's domain settings. This prevents transfers and nameserver changes without explicit unlocking.
For high-value domains, ask your registrar about registry lock — a stronger lock applied at the TLD registry level that requires manual verification to remove. See registrar lock vs transfer lock for the full explanation.
# Verify lock status
whois yourdomain.com | grep "Domain Status"
# You want to see: clientTransferProhibited, clientUpdateProhibited
The email address on your registrar account is the key to that account. If an attacker compromises that email, they can reset your registrar password.
Use a dedicated email address for your domain registrar that's:
WHOIS privacy (also called Domain Privacy or Registrant Privacy) replaces your personal or company contact details in the public WHOIS record with the registrar's proxy contact information. This prevents attackers from:
Most registrars offer WHOIS privacy for free or as a low-cost add-on. ICANN's WHOIS information page covers data accuracy requirements.
Registrar accounts are a high-value target. Use a password manager and generate a unique, strong password specifically for your registrar account. Don't reuse passwords from other services.
If the email address in your WHOIS record is outdated (former employee, closed mailbox), transfer authorisation emails go undelivered — and attackers can potentially use the abandoned email. Keep your WHOIS contacts current.
Even with all the above in place, monitoring gives you early warning if something changes. An unexpected nameserver change is the clearest signal of a hijacking attempt in progress.
Act immediately — time matters.
Recovery isn't guaranteed, and can take weeks. Prevention is far cheaper.
Domain Monitor continuously monitors your domain's DNS records and nameservers. An unauthorised nameserver change — the first step in most hijacking attempts — triggers an immediate alert. Create a free account and add DNS monitoring for every domain you own or manage.
See what is domain hijacking for background on the threat, and how to monitor nameserver changes across client domains for the monitoring approach.
A subdomain takeover lets an attacker claim your subdomain by exploiting dangling DNS records. Learn how it happens, real-world examples, and how DNS monitoring detects it.
Read moreMean time to detect (MTTD) measures how long it takes to discover an incident after it starts. Reducing MTTD is one of the highest-leverage improvements in reliability engineering.
Read moreBlack box monitoring tests your systems from the outside, the way users experience them — without access to internal code or infrastructure. Learn how it works and when to use it.
Read moreLooking to monitor your website and domains? Join our platform and start today.