DNS Tech Support Training Courses DNSSEC Consulting DNS Analysis System Audit Customer Portal
The DNS Institute
Documentation Implementations Research DNS History Free DNS Tools

Dangling DNS MX

PDF screenshot

This paper shares examples of a novel approach to finding Dangling DNS targets where, due to typos or lack of tracking, DNS MX records may point to domains that are available for third-party purchase and potentially be abused for impersonation, social engineering attacks, and private information theft with partial (like collect some messages) or complete (for two-way communications) email take over.


Frequently Asked Questions

What if the company's email doesn't work and they don't use it anyways?

      While they will unlikely notice at first, a third party could represent them via email using the "legitimate" domain name for social engineering attacks. Advertising, even in print, can convince existing customers and contacts to start using "official" email addresses controlled by an unrelated third-party.

Who cares if it is lower priority (larger number) MX target?

      Whether it is part of a DNS round robin or lower priority, a MX listener could slowly collect some emails here and there. Email participants are unlikely to notice a real problem, while information disclosure continues to happen. In addition, higher priority (small number) MX target mail servers could be made to be temporarily be off-line for various senders' point of views.

Isn't this an already known problem?

      Yes this is documented in papers and various articles, but with little focus on email specifically. This paper highlights it specifically for email and, in addition, it introduces a new approach to discover and recognize Dangling DNS targets.

Why disclose all these organizations?

      We attempted to contact companies about this since 2019. See What does "Responsible" mean for Vulnerability Disclosures? We had a less than three percent success rate. Imagine the problem already exists and working mail servers may already be handling other's MX targets maliciously — and would not be detected by these methods.


Contact Us | About | Site Map |  Gab |  Twitter