Skip to content

Commit 0aa0528

Browse files
authored
Add best way to prevent domain and email expiry risks and Threat Model (#1109)
1 parent 93f2045 commit 0aa0528

File tree

1 file changed

+47
-2
lines changed

1 file changed

+47
-2
lines changed

pages/vulnerabilities/Allowing_Domains_or_Accounts_to_Expire.md

Lines changed: 47 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@
33
layout: col-sidebar
44
title: Allowing Domains or Accounts to Expire
55
author:
6-
contributors:
6+
contributors:
7+
-Akul Kaushal
78
permalink: /vulnerabilities/Allowing_Domains_or_Accounts_to_Expire
89
tags: vulnerability, Allowing Domains or Accounts to Expire
910

@@ -21,4 +22,48 @@ Through neglect an administrator may allow a domain name or e-mail account to ex
2122
- Considering that, you should be careful only to use e-mails hosted on domains owned by companies that don't show any sign of going under in the future.
2223
- There is very little recourse if a malicious entity has purchased your domain. They can sell it back to you for however much money they want to charge. Even if you have grounds for a lawsuit, it can take months at least.
2324
- If you have applications(especially no-longer supported) sending data to a domain, if an attacker buys the domain they can gather personal information from your users.
24-
- Domains most likely to expire are those belonging to projects or companies that no longer exist.
25+
- Domains most likely to expire are those belonging to projects or companies that no longer exist.
26+
27+
28+
## Threat Model
29+
30+
| **Asset** | **Threat** | **Impact** |
31+
|------------------------|------------------------------------------------|-----------------------------------|
32+
| Expired Domain | Purchased by attacker | Intercept user emails |
33+
| Old Email Address | Reclaimed by attacker | Reset linked accounts |
34+
| Legacy App Endpoints | Still communicating with expired domain | Leak sensitive user or app data |
35+
| Backup/Recovery Emails | Controlled by third parties post-expiry | Account takeover, identity theft |
36+
37+
Attackers often exploit these expired assets to:
38+
- Monitor and harvest incoming mail (especially spam and password reset emails).
39+
- Conduct phishing or social engineering using a trusted domain.
40+
- Reverse-engineer platform usage and service connections of former users.
41+
42+
---
43+
44+
## Ways to Prevent Domain and Email Expiry Risks
45+
46+
1. **Track Domain and Email Expiration Dates**
47+
Implement a centralized tracking system with automated alerts to monitor upcoming renewals and prevent accidental lapses.
48+
49+
2. **Enable Auto-Renewal for Critical Services**
50+
Configure auto-renewal for all essential domains and email services, ensuring a valid and up-to-date payment method is in place.
51+
52+
3. **Avoid Free or Unreliable Email Providers**
53+
For business-critical communications, use email accounts hosted on domains you control. Avoid free services (e.g., Yahoo, Hotmail) for any official or recovery-related use.
54+
55+
4. **Use Stable, Owned Domains for Account Recovery**
56+
Ensure account recovery emails (e.g., for social media, cloud platforms) are tied to institutional or long-term domains—not temporary or project-based ones.
57+
58+
5. **Properly Decommission Legacy Applications**
59+
Before retiring an application or domain, audit all dependencies and update configurations to prevent sensitive data from being sent to an attacker-controlled domain.
60+
61+
62+
## Related OWASP Topics
63+
- [OWASP Domain Protect Project](https://owasp.org/www-project-domain-protect/)
64+
- [OWASP Top 10: A05 – Security Misconfiguration](https://owasp.org/Top10/A05_2021-Security_Misconfiguration/)
65+
- [OWASP Application Security Verification Standard (ASVS)](https://owasp.org/www-project-application-security-verification-standard/)
66+
- Threat modeling methodologies such as STRIDE
67+
68+
---
69+

0 commit comments

Comments
 (0)