
Domain hijacking — where an attacker seizes control of your domain registration and redirects traffic to their infrastructure — is one of the most serious incidents a website owner can face. Recovery is possible, but speed matters enormously. Every hour your domain is under attacker control is an hour of potential data theft, credential harvesting, and brand damage.
This guide covers immediate actions, registrar escalation, and the formal recovery process.
Before escalating, confirm what you're dealing with. Symptoms of hijacking include:
Run a quick DNS check:
dig NS yourdomain.com
dig A yourdomain.com
whois yourdomain.com | grep -E "Name Server|Registrant"
Compare the results against your known-good records. If nameservers have changed to an unrecognised provider, treat this as active hijacking.
Before changing anything, capture evidence:
This documentation is critical for registrar disputes, ICANN complaints, and any legal proceedings.
Attempt to log into your registrar account:
Do not use standard support tickets — find the registrar's abuse or security team contact. For major registrars:
State clearly: "My domain has been hijacked. I believe unauthorised changes have been made to my registrar account. I need account access suspended and the transfer/changes reversed."
Ask the registrar to apply a server hold (serverHold status) on the domain. This prevents further DNS propagation changes while the dispute is resolved.
If your registrar is unresponsive or the domain has been transferred to a different registrar, you need to escalate to the domain registry — the organisation that manages the TLD (.com is managed by Verisign, .co.uk by Nominet, etc.).
Each registry has its own dispute process for hijacking cases. Registries can apply holds and reversals that override registrar-level changes.
For gTLDs (.com, .net, .org, etc.), file a complaint with ICANN via their complaint portal. ICANN has authority over accredited registrars and can intervene in cases of unauthorised transfers.
ICANN's Transfer Dispute Resolution Policy (TDRP) covers unauthorised domain transfers between registrars.
If the attacker is using your hijacked domain for phishing, the Uniform Domain-Name Dispute-Resolution Policy (UDRP) allows rights holders to reclaim domains being used in bad faith. This is slower than the above routes but available.
If your email was hosted on the hijacked domain, you've likely lost access to that email too. This creates a chicken-and-egg problem — your registrar sends verification emails to an address you can't access.
Steps:
Once the domain is recovered:
See how to prevent domain hijacking for a full prevention checklist, and registrar lock vs transfer lock for understanding the different protection mechanisms.
A subdomain takeover lets an attacker claim your subdomain by exploiting dangling DNS records. Learn how it happens, real-world examples, and how DNS monitoring detects it.
Read moreMean time to detect (MTTD) measures how long it takes to discover an incident after it starts. Reducing MTTD is one of the highest-leverage improvements in reliability engineering.
Read moreBlack box monitoring tests your systems from the outside, the way users experience them — without access to internal code or infrastructure. Learn how it works and when to use it.
Read moreLooking to monitor your website and domains? Join our platform and start today.