Scammers hijack university subdomains to serve porn

Scammers have exploited poor record-keeping at top universities to hijack hundreds of subdomains, serving explicit pornography and malicious scams. Researcher Alex Shakhov identified at least 34 affected institutions, including UC Berkeley, Columbia University, and Washington University in St. Louis. The vulnerabilities arise from unremoved DNS CNAME records for decommissioned subdomains.

Alex Shakhov, founder of SH Consulting, recently uncovered that scammers, linked by another researcher to the Hazy Hawk group, have taken over subdomains on official university websites. Examples include causal.stat.berkeley.edu hosting porn videos, conversion-dev.svc.cul.columbia.edu linking to explicit gym content, and provost.washu.edu serving a scam PDF falsely claiming computer infections. Google search results show thousands of such hijacked pages ranking highly due to the universities' reputations. Google searches like site:berkeley.edu “xxx” reveal scores of these results, though some have been cleaned up recently. Shakhov explained the root cause: organizations create DNS CNAME records for subdomains but fail to delete them after decommissioning. “The root cause is simple: organizations create DNS records and never clean them up. There is no expiry date on a CNAME record. Nobody gets an alert when the target stops responding. And most university IT departments don’t maintain a comprehensive inventory of their subdomains and where they point,” Shakhov wrote. Universities' decentralized structures exacerbate the problem, with departments and labs creating subdomains independently without proper decommissioning processes. Shakhov recommends that organizations inventory all subdomains, audit for dangling records, and remove inactive CNAMEs. Only a few affected universities have acted, and some still show indexed pages in search results despite fixes. Inquiries to UC Berkeley, Columbia, and Washington University received no responses.

संबंधित लेख

Attackers have exploited the .arpa internet domain to host malicious websites and deliver phishing links. They use IPv6 and hidden .arpa addresses to disguise URLs and steal user credentials. The scheme was reported by TechRadar on March 2, 2026.

AI द्वारा रिपोर्ट किया गया

Major VPN providers such as NordVPN, ExpressVPN, and Proton VPN are facing attacks through typosquatting, where fake domains mimic their official sites. A report indicates that 14 percent of these imitation domains are malicious. Users are advised to take precautions to avoid falling victim to these scams.

German police and Europol shut down around 373,000 to 400,000 darknet sites selling gross child abuse material and scams in Operation Alice. Five Swedish men are suspected of gross child pornography crimes following a tip from German police. 440 customers were identified in the five-year investigation.

AI द्वारा रिपोर्ट किया गया

Daniel Stenberg, creator of the widely used curl program, draws parallels between his project and a cyberattack that nearly succeeded two years ago. In an interview in Huddinge, he stresses the importance of trust in open-source software underpinning the internet. An expert warns he could theoretically shut down half the internet.

 

 

 

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए विश्लेषण के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें