Implementing Best Practices

Below are some best practices for defenders who want to strengthen their networks against these types of attacks:
  • Continuous monitoring and analysis of the DNS records within your attack surface

  • Remove DNS entries for sites that are no longer being used

  • Regularly monitor and test where each subdomain is being used

  • Conduct subdomain enumeration

  • In the event of an attack, best practices include quickly contacting your service provider to alert them of the fraudulent activity and cleansing the DNS records of the targeted entry.

Resources