Microsoft Subdomains Hijacked Even After Repeated Warning Bells!

Microsoft subdomains are hijacked now. In spite of prior warning against the vulnerability in subdomains, the company didn't pay any heed to the warning, putting nearly 670 subdomains at risk of getting hijacked. Such domains can be used by hackers to spam, scan millions of users as well as company employees.

Must Read

Around two weeks ago, we reported about the vulnerability in over hundreds of subdomains that belong to Microsoft Corporation (NASDAQ:MSFT). Citing the researchers claim, we also explained how these Microsoft subdomains could be hijacked and used for attacks against their own employees, users or for showing them spammy content. However, the tech giant Microsoft didn’t seem to pay much heed to the concerning issue then.

Now, it has been reported that the same series of Microsoft’s vulnerable subdomains have been hijacked by researchers of Vulnerability after they held the company accountable for poor DNS practices.

The ten hijacked subdomains of Microsoft by the team of Vulnerability security researchers includes and as well. It has been reported that the number of Microsoft subdomains that currently face the risk of being taken over is well over 670 as of now.

The hijacked domains were reported by Numan Ozdemir and Ozan Agdepe from Vulnerability’s exploit and vulnerability alert service to Microsoft. Subdomains which were not linked to a website is what the team reportedly hunted for. It was a piece of cake for the team to see where a particular subdomain was supposed to redirect as Microsoft hosts them on Azure. For example, could be linked to

Vulnerability also dug out the fact that in many cases when a particular subdomain was no longer being used by Microsoft, its DNS record was left as it is in place. Therefore, all that a hijacker needs to do in such cases is get hold of an Azure account to request and that would allow the hijacker to host whatever he or she pleases such as fake Microsoft phishing pages to collect usernames and passwords of the employees.

The researchers from Vulnerability said the whole process is dead simple and would require very less technical skills on the hijacker’s part to do a significant amount of harm. It was also mentioned that within 5 to 50 minutes a successful hijack could easily be carried out.

Ozdemir and Agdepe from the team of the security researchers of Vulnerability said that they were responsible for ethically reported those vulnerably critical subdomains to Microsoft before malicious attackers could exploit them by hijacking.

In the video below, they both demonstrate how the theft of account passwords and cookies are one of the major vulnerabilities of subdomain takeover.

Microsoft Repeatedly Ignoring Warning Bells?

As mentioned previously that it’s high time Microsoft should take notice of this problem. It is easier for the company now to get rid of it while the alarms are still going off and not after the situation has worsened, it looks like the company doesn’t really believe in taking precautions.

This time, the Vulnerability researchers have only reported 10 of the insecure subdomains to Microsoft, leaving out all the 660+ other vulnerable ones. They have taken the decision to do so in order to now take it upon themselves to make Microsoft offer researchers bounties to find such subdomain takeover security vulnerabilities. As of right now, Microsoft’s bug bounty program still doesn’t include these subdomain takeovers.


Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

“Microsoft Copilot PC” Could Be a Game Changer: Outperforms Apple Air by 58% in Performance

In a bid to revolutionize the landscape of personal computing, Microsoft has unveiled Copilot+ PCs, a groundbreaking breed of...
- Advertisement -

In-Depth: Dprime

The Mad Rush: The Rising Wave of Smartwatches Among Indian Consumers

A few months ago, a 36-year-old named Adam Croft, residing in Flitwick, Bedfordshire, had a startling experience. One evening, he woke up feeling slightly...



More Articles Like This