Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1112

Subdomain Takeover

What is Subdomain Takeover?

Subdomain TakeoverAn attack in which a dangling DNS record (often a CNAME) points to an unclaimed cloud or SaaS resource, letting an attacker register that resource and impersonate the subdomain.


Subdomain takeover happens when a DNS record on a victim's domain still points to an external service that is no longer in use - the canonical case is a CNAME like assets.example.com -> example-bucket.s3.amazonaws.com when the underlying bucket, GitHub Pages site, Heroku app, or Azure resource has been deleted. An attacker who can re-register the same external name now controls content served under the victim's subdomain, including cookies, OAuth callbacks, CORS-trusted origins, and brand reputation. Detection relies on continuously inventorying DNS records, fingerprinting takeover-vulnerable providers, and reconciling with cloud inventories. Mitigation involves removing or repointing dangling CNAMEs, enforcing DNS hygiene at decommission, and using domain ownership tokens where available.

Examples

  1. 01

    An attacker registers a deleted GitHub Pages site whose CNAME still points to docs.example.com.

  2. 02

    An expired Azure Traffic Manager profile lets an attacker reclaim the same FQDN and serve phishing pages.

Frequently asked questions

What is Subdomain Takeover?

An attack in which a dangling DNS record (often a CNAME) points to an unclaimed cloud or SaaS resource, letting an attacker register that resource and impersonate the subdomain. It belongs to the Network Security category of cybersecurity.

What does Subdomain Takeover mean?

An attack in which a dangling DNS record (often a CNAME) points to an unclaimed cloud or SaaS resource, letting an attacker register that resource and impersonate the subdomain.

How does Subdomain Takeover work?

Subdomain takeover happens when a DNS record on a victim's domain still points to an external service that is no longer in use - the canonical case is a CNAME like assets.example.com -> example-bucket.s3.amazonaws.com when the underlying bucket, GitHub Pages site, Heroku app, or Azure resource has been deleted. An attacker who can re-register the same external name now controls content served under the victim's subdomain, including cookies, OAuth callbacks, CORS-trusted origins, and brand reputation. Detection relies on continuously inventorying DNS records, fingerprinting takeover-vulnerable providers, and reconciling with cloud inventories. Mitigation involves removing or repointing dangling CNAMEs, enforcing DNS hygiene at decommission, and using domain ownership tokens where available.

How do you defend against Subdomain Takeover?

Defences for Subdomain Takeover typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Subdomain Takeover?

Common alternative names include: Dangling CNAME takeover, Dangling DNS takeover.

Related terms

See also