{"id":50382,"date":"2021-11-25T08:24:52","date_gmt":"2021-11-25T07:24:52","guid":{"rendered":"https:\/\/www.digitalbusiness.africa\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/"},"modified":"2026-03-01T15:04:31","modified_gmt":"2026-03-01T14:04:31","slug":"how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion","status":"publish","type":"post","link":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/","title":{"rendered":"How I hijacked the top-level domain of a sovereign state  [Expert Opinion*]"},"content":{"rendered":"<p><strong>[Digital Business Africa] &#8211;<\/strong><\/p>\n<p>Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name used in NS delegations for the Democratic Republic of Congo ccTLD (.cd). He then temporarily took control of 50% of all DNS traffic for websites using .cd and could have exploited it for malicious purposes and other abuses. His testimony as published on his website:<\/p>\n<p><em>Note: This issue has been resolved and the .cd ccTLD no longer sends NS delegations to the compromised domain.<\/em><\/p>\n<p><strong>TL;DR: Imagine what could happen if the country-code top-level domain (ccTLD) of a sovereign state fell into the wrong hands. Here\u2019s how I (<a href=\"https:\/\/twitter.com\/almroot\">@Almroot<\/a>) bought the domain name used in the NS delegations for the ccTLD of the Democratic Republic of Congo (.cd) and temporarily took over 50% of all DNS traffic for the TLD that could have been exploited for MITM or other abuse.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/localimages\/210114_Labs_DNS_Kongo_Hijack.png\" alt=\"dns hijack hero labs\" width=\"2400\" height=\"1260\" \/><\/p>\n<h2>Background<\/h2>\n<p>\u2018Twas the week before Christmas 2020 and I decided to run an analysis of all NS records used by all the TLDs globally. However one thing caught my attention. The domain name \u201cscpt-network.com\u201d had the EPP status code \u201credemptionPeriod\u201d, which meant that someone had failed to renew their domain (pay their invoice?) in time.<\/p>\n<p>This is quite problematic as the name servers managing <code>.cd<\/code> are the following:<\/p>\n<pre>almroot@x:~$ dig NS +trace cd | grep \"cd.\"\r\ncd.\t\t\t172800\tIN\tNS\tns-root-5.scpt-network.com.\r\ncd.\t\t\t172800\tIN\tNS\tigubu.saix.net.\r\ncd.\t\t\t172800\tIN\tNS\tsangoma.saix.net.\r\ncd.\t\t\t172800\tIN\tNS\tns-root-2.scpt-network.com.\r\ncd.\t\t\t172800\tIN\tNS\tsabela.saix.net.\r\ncd.\t\t\t172800\tIN\tNS\tns-root-1.scpt-network.com.\r\n<\/pre>\n<p>So I figured I might as well make a bash script to ping me of any EPP status change of the domain.<\/p>\n<p>To my surprise, about a week or so later, I got a ping that the domain had reached status \u201cpendingDelete\u201d.<\/p>\n<p><strong>I realized the severity of this.<\/strong> The domain name would soon be available for purchase by anyone on the Internet, meaning that the person who gets hold of that domain name would also get the NS capabilities of <code>.cd<\/code>.<\/p>\n<p>I modified the script, and started probing the registrar on a minute basis for any further status changes.<\/p>\n<p>On the evening of December 30, I got a ping. <strong>I opened my laptop and purchased the domain name to keep it from falling into the wrong hands.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/localimages\/cd-zone.png\" alt=\"scpt-network.com CD domain hack\" width=\"1845\" height=\"1796\" \/><\/p>\n<p>As the three remaining delegations pointing to SAIX (<a href=\"https:\/\/saix.net\/\">the South African Internet eXchange<\/a>) were still working, the TLD remained operable throughout this time (albeit with a slight performance impact on any domain lookups).<\/p>\n<p>Since I owned <code>scpt-network.com<\/code>, I could configure any subdomain under the zone at will. If I created a new subdomain (like <code>ns-root-1<\/code>) with an A-pointer to IP <code>1.3.3.7<\/code>, then <code>1.3.3.7<\/code> would get legitimate incoming DNS queries meant for <code>.cd<\/code>. <strong>Any DNS response to those queries would be accepted by the caller<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/localimages\/cd-dns-hijack.png\" alt=\"cd dns hijack\" width=\"1280\" height=\"1211\" \/><\/p>\n<p>To not reply would cause the caller to reach a timeout, and the status code SERVFAIL would be assumed. This is good as a SERVFAIL will force the caller to try reaching any other name server (NS record) for the zone (<code>.cd<\/code>). That is, the caller would eventually hit one of the legitimate SAIX records and be routed appropriately to the correct destination.<\/p>\n<h2>Potential impact<\/h2>\n<p>Hijacking the country-code top-level domain of a sovereign state has serious negative implications, especially if the domain were to fall into the hands of cybercriminals or a foreign adversary. The Democratic Republic of Congo (DRC) is not a small country. There are roughly <a href=\"http:\/\/data.un.org\/en\/iso\/cd.html\">90 million people<\/a>, not to mention many international companies and organizations operating with a <code>.cd<\/code> website.<\/p>\n<p>DNS hijacking involving the TLD of an entire country is rare but not unheard of. For example, the ccTLD of the former <a href=\"https:\/\/www.theguardian.com\/technology\/2013\/may\/31\/ussr-cybercriminals-su-domain-space\">Soviet Union (.su)<\/a> has been hijacked by cybercriminals in the past, and the Lenovo and Google websites for <a href=\"https:\/\/www.pcworld.com\/article\/2889392\/like-google-in-vietnam-lenovo-tripped-up-by-a-dns-attack.html\">Vietnam (.vn)<\/a> also fell prey to DNS hijacking in 2015. Redirecting DNS traffic from legitimate <code>.cd<\/code> websites to a phishing site is one clear potential for abuse, but there\u2019s more.<\/p>\n<p>If I had operated with malicious intent, I could have also:<\/p>\n<ul>\n<li><strong>Passively intercepted DNS traffic<br \/>\n\u2013 which could be used for surveillance or data exfiltration<\/strong><\/li>\n<li><strong>Made new domain names \u201cout of thin air\u201d<\/strong><br \/>\n\u2013 imagine the capabilities if leveraged for <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fast_flux\">Fast Fluxing<\/a><\/li>\n<li><strong>Launched remote code execution (RCE) attacks on local networks<\/strong><br \/>\n\u2013 and target companies that use WPAD to query public DNS servers<\/li>\n<li><strong>Replied to legitimate DNS queries with bogus DNS responses<\/strong><br \/>\n\u2013 and completely took over targeted apex domains for companies or institutions with a <code>.cd<\/code> website or even launched a DDoS attack.<\/li>\n<\/ul>\n<p>For example, I could have crafted an exploit that completely hijacked a specific apex domain under <code>.cd<\/code>. Let\u2019s imagine that I always reply with NS <code>ns-root-1.scpt-network.com<\/code> (instead of these four: <code>[ns1,ns2,n3,ns4].google.com<\/code>) for any NS requests to <code>google.cd<\/code>. Now the caller will see this, and then carry out any subsequent DNS requests to <code>ns-root-1.scpt-network.com<\/code> which I control.<\/p>\n<p>This also got me thinking, what if I replied to all NS queries with a reference back to myself. Then for any A question replied with <code>1.3.3.7<\/code>, all domain lookups for any apex or subdomain would eventually hit my manipulated A pointer. All subsequent network traffic would then be redirected to <code>1.3.3.7<\/code> and lead in a <strong>DDoS<\/strong>\u00a0attack.<\/p>\n<p><strong>In fact, this would also affect the availability of the entire TLD. 50% of the DNS traffic would become faulty, and the impact of (both) DoS attacks could be amplified by setting a high TTL in the DNS replies.<\/strong><\/p>\n<p>Taking this a step further, say I were to explicitly target TXT records served for <code>google.cd<\/code>. Then I would be able to abuse the Let\u2019s Encrypts <a href=\"https:\/\/letsencrypt.org\/docs\/challenge-types\/#dns-01-challenge\">DNS-01 challenge<\/a> to issue a valid certificate for <code>google.cd<\/code> and effectively <strong>undermine SSL\/TLS<\/strong> communications.<\/p>\n<p>As I could control the NS delegations of any <code>.cd<\/code> apex domain, and <strong>get valid certificates<\/strong>, I would have been able to perform a <a href=\"https:\/\/labs.detectify.com\/2018\/11\/29\/abuse-mitm-regardless-of-https\/\">MITM<\/a> attack even when SSL\/TLS is enforced by the target.<\/p>\n<p>While Google has various counter measures and mitigations for this kind of abuse, it\u2019s safe to say this is not the case for <em>all apex domain names<\/em> under <code>.cd<\/code>. Further information on how CA\u2019s verify the ownership of domain names can be found in <a href=\"https:\/\/cabforum.org\/wp-content\/uploads\/CA-Browser-Forum-BR-1.7.3.pdf\">BR 1.7.3<\/a>.<\/p>\n<p>Last but not least, with privileged access on an upstream host with DNS control, I could even <strong>infiltrate the local networks of companies<\/strong> (redacted in screenshot below) that send DNS lookups for WPAD by monitoring their queries, spoofing a reply, and redirecting the local network caller to download and <strong>execute malicious JS-based proxy configuration over the Internet<\/strong>. The WPAD protocol has had its share of issues, including RCE vulnerabilities as discussed by <a href=\"https:\/\/googleprojectzero.blogspot.com\/2017\/12\/apacolypse-now-exploiting-windows-10-in_18.html\">Google\u2019s Project Zero<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/localimages\/wpad-dns-hijack.png\" alt=\"wpad dns hijack\" width=\"1058\" height=\"500\" \/><\/p>\n<h2>Mitigation<\/h2>\n<p>On January 7th, I reached out to the Administrative and Technical contacts listed for <code>.cd<\/code> on <a href=\"https:\/\/www.iana.org\/domains\/root\/db\/cd.html\">IANA\u2019s webpage<\/a>. My initial thought was to transfer back the ownership of the domain name to the entity operating <code>.cd<\/code>.<\/p>\n<p>Although one of the contacts replied and delegated to their colleague, as of this writing, I haven\u2019t received any follow-up confirmation that they fixed the issue. Nonetheless, the issue seems to have been patched shortly after I contacted them as the DNS traffic I previously controlled for <code>.cd<\/code> has since been redirected to <code>scpt-network.net<\/code>.<\/p>\n<p>I also submitted a report on January 8th to the Internet Bug Bounty on HackerOne, and I\u2019m looking forward to seeing how they respond.<\/p>\n<h2>Conclusion<\/h2>\n<p>The potential implications for DNS hijacking of a ccTLD are widespread and have extreme negative consequences, especially if the attacker has bad intentions. This vulnerability affects more than a single website, <a href=\"https:\/\/labs.detectify.com\/2014\/10\/21\/hostile-subdomain-takeover-using-herokugithubdesk-more\/\">subdomain<\/a>, or even a single apex domain. All <code>.cd<\/code> websites, including those for major international companies, financial institutions, and other organizations that have a <code>.cd<\/code> domain in Africa\u2019s second most populous country could have fallen victim to abuse, including phishing, MITM, or DDoS.<\/p>\n<p>As of this writing, I still own the domain name for <code>scpt-network.com<\/code> although NS delegations from the ccTLD <code>.cd<\/code> seemed to have stopped around January 8, 2021 after I reached out to the ccTLD contacts on January 7th. I did this to prevent malicious actors from hijacking the ccTLD of the Democratic Republic of Congo within the narrow window of time the domain name for one of the name servers managing the <code>.cd<\/code> TLD could\u2019ve been taken over by anyone. Luckily, in this case, no damage appears to have been done.<\/p>\n<p><strong>How can companies protect themselves from DNS hijacking and subdomain takeovers? <a href=\"https:\/\/detectify.com\/product\/asset-monitoring\" target=\"_blank\" rel=\"noopener\">Find out here!<\/a><\/strong><\/p>\n<p><strong>Interested in joining me in the Detectify Crowdsource ethical hacker community? Take our challenge and find out if you got what it takes at <a href=\"https:\/\/cs.detectify.com\/apply\" target=\"_blank\" rel=\"noopener\"><b>https:\/\/cs.detectify.com\/apply.<\/b><\/a><\/strong><\/p>\n<p><strong>Fredrik N. Almroth<\/strong><\/p>\n<p>Fredrik Nordberg Almroth (<a href=\"https:\/\/twitter.com\/almroot\">@Almroot<\/a>) is Co-Founder and Head of Engineering at Detectify. He has been elected Security Expert of the Future 2015 by Symantec and is featured on Google Security Hall of Fame. Fredrik has helped organizations like Google, the UN and the US Air Force uncover web vulnerabilities, and is a staunch security defender committed to making the Internet safer for everyone.<\/p>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" src=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/Freddy.jpeg\" alt=\"\" class=\"wp-image-50369\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>[Digital Business Africa] &#8211; Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name used in NS delegations for the Democratic Republic of Congo ccTLD (.cd). He then temporarily took control of 50% of all DNS traffic for websites using .cd [&hellip;]<\/p>\n","protected":false},"author":63,"featured_media":50367,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[46585,46609,46541,46582],"tags":[56326,56325],"class_list":{"0":"post-50382","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-experts","8":"category-internet-en-2","9":"category-latest-publications","10":"category-slidehome-en","11":"tag-detectify-en","12":"tag-fredrik-n-almroth-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How I hijacked the top-level domain of a sovereign state [Expert Opinion*] - Digital Business Africa<\/title>\n<meta name=\"description\" content=\"- Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How I hijacked the top-level domain of a sovereign state [Expert Opinion*] - Digital Business Africa\" \/>\n<meta property=\"og:description\" content=\"- Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Business Africa\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalBusinessAFRIC\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/DigitalBusinessAFRIC\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-25T07:24:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-01T14:04:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/50365-210114_Labs_DNS_Kongo_Hijack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Digital Business Africa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DigitalBusiness\" \/>\n<meta name=\"twitter:site\" content=\"@DigitalBusiness\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Business Africa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/\"},\"author\":{\"name\":\"Digital Business Africa\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/person\\\/ff3c1f37f3f78ad65e9c4800c0447708\"},\"headline\":\"How I hijacked the top-level domain of a sovereign state [Expert Opinion*]\",\"datePublished\":\"2021-11-25T07:24:52+00:00\",\"dateModified\":\"2026-03-01T14:04:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/\"},\"wordCount\":1443,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/50365-210114_Labs_DNS_Kongo_Hijack.png\",\"keywords\":[\"Detectify\",\"Fredrik N. Almroth\"],\"articleSection\":[\"Experts\",\"Internet\",\"LATEST PUBLICATIONS\",\"SLIDEHOME\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/#respond\"]}],\"copyrightYear\":\"2021\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/\",\"name\":\"How I hijacked the top-level domain of a sovereign state [Expert Opinion*] - Digital Business Africa\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/50365-210114_Labs_DNS_Kongo_Hijack.png\",\"datePublished\":\"2021-11-25T07:24:52+00:00\",\"dateModified\":\"2026-03-01T14:04:31+00:00\",\"description\":\"- Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/50365-210114_Labs_DNS_Kongo_Hijack.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/50365-210114_Labs_DNS_Kongo_Hijack.png\",\"width\":2400,\"height\":1260,\"caption\":\"How I hijacked the top-level domain of a sovereign state\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/\",\"name\":\"Digital Business Africa\",\"description\":\"Le Mag des d\u00e9cideurs consacr\u00e9 \u00e0 l&#039;actualit\u00e9 des TIC, des T\u00e9l\u00e9coms et du Num\u00e9rique en Afrique\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#organization\",\"name\":\"Digital Business Africa\",\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.digitalbusiness.africa\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1\",\"width\":2995,\"height\":953,\"caption\":\"Digital Business Africa\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalBusinessAFRIC\",\"https:\\\/\\\/x.com\\\/DigitalBusiness\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalbusinessafrica\",\"https:\\\/\\\/www.youtube.com\\\/@DIGITALbusinessafrica\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/#\\\/schema\\\/person\\\/ff3c1f37f3f78ad65e9c4800c0447708\",\"name\":\"Digital Business Africa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9e4a1bc2f72a65580318195742699c9067d8f5c29bc6f8868a76454109f5803?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9e4a1bc2f72a65580318195742699c9067d8f5c29bc6f8868a76454109f5803?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9e4a1bc2f72a65580318195742699c9067d8f5c29bc6f8868a76454109f5803?s=96&d=mm&r=g\",\"caption\":\"Digital Business Africa\"},\"description\":\"DIGITAL Business Africa est la plateforme d'infos strat\u00e9giques sur le secteur des TIC, des T\u00e9l\u00e9coms et du Num\u00e9rique en Afrique. Son Directeur de publication est Beaugas Orain DJOYUM , journaliste et consultant en e-R\u00e9putation, en communication digitale et en veille strat\u00e9gique. Pour le contact : contact@digitalbusiness.africa. T\u00e9l\u00e9phone : +237 243 25 64 36\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalBusinessAFRIC\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/tic-mag\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/TICMag\\\/\"],\"url\":\"https:\\\/\\\/www.digitalbusiness.africa\\\/en\\\/author\\\/kina\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How I hijacked the top-level domain of a sovereign state [Expert Opinion*] - Digital Business Africa","description":"- Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/","og_locale":"en_US","og_type":"article","og_title":"How I hijacked the top-level domain of a sovereign state [Expert Opinion*] - Digital Business Africa","og_description":"- Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name","og_url":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/","og_site_name":"Digital Business Africa","article_publisher":"https:\/\/www.facebook.com\/DigitalBusinessAFRIC","article_author":"https:\/\/www.facebook.com\/DigitalBusinessAFRIC","article_published_time":"2021-11-25T07:24:52+00:00","article_modified_time":"2026-03-01T14:04:31+00:00","og_image":[{"width":2400,"height":1260,"url":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/50365-210114_Labs_DNS_Kongo_Hijack.png","type":"image\/png"}],"author":"Digital Business Africa","twitter_card":"summary_large_image","twitter_creator":"@DigitalBusiness","twitter_site":"@DigitalBusiness","twitter_misc":{"Written by":"Digital Business Africa","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/#article","isPartOf":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/"},"author":{"name":"Digital Business Africa","@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/person\/ff3c1f37f3f78ad65e9c4800c0447708"},"headline":"How I hijacked the top-level domain of a sovereign state [Expert Opinion*]","datePublished":"2021-11-25T07:24:52+00:00","dateModified":"2026-03-01T14:04:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/"},"wordCount":1443,"commentCount":0,"publisher":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#organization"},"image":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/50365-210114_Labs_DNS_Kongo_Hijack.png","keywords":["Detectify","Fredrik N. Almroth"],"articleSection":["Experts","Internet","LATEST PUBLICATIONS","SLIDEHOME"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/#respond"]}],"copyrightYear":"2021","copyrightHolder":{"@id":"https:\/\/www.digitalbusiness.africa\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/","url":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/","name":"How I hijacked the top-level domain of a sovereign state [Expert Opinion*] - Digital Business Africa","isPartOf":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/50365-210114_Labs_DNS_Kongo_Hijack.png","datePublished":"2021-11-25T07:24:52+00:00","dateModified":"2026-03-01T14:04:31+00:00","description":"- Digital Business Africa brings you the testimony of Fredrik N. Almroth, ethical hacker and promoter of Detectify, who in 2020 acquired the domain name","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalbusiness.africa\/en\/how-i-hijacked-the-top-level-domain-of-a-sovereign-state-expert-opinion\/#primaryimage","url":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/50365-210114_Labs_DNS_Kongo_Hijack.png","contentUrl":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/50365-210114_Labs_DNS_Kongo_Hijack.png","width":2400,"height":1260,"caption":"How I hijacked the top-level domain of a sovereign state"},{"@type":"WebSite","@id":"https:\/\/www.digitalbusiness.africa\/en\/#website","url":"https:\/\/www.digitalbusiness.africa\/en\/","name":"Digital Business Africa","description":"Le Mag des d\u00e9cideurs consacr\u00e9 \u00e0 l&#039;actualit\u00e9 des TIC, des T\u00e9l\u00e9coms et du Num\u00e9rique en Afrique","publisher":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalbusiness.africa\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalbusiness.africa\/en\/#organization","name":"Digital Business Africa","url":"https:\/\/www.digitalbusiness.africa\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.digitalbusiness.africa\/wp-content\/uploads\/2022\/07\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.digitalbusiness.africa\/wp-content\/uploads\/2022\/07\/NEW-LOGO-DBA-Sans-Fond.png?fit=2995%2C953&quality=80&ssl=1","width":2995,"height":953,"caption":"Digital Business Africa"},"image":{"@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalBusinessAFRIC","https:\/\/x.com\/DigitalBusiness","https:\/\/www.linkedin.com\/company\/digitalbusinessafrica","https:\/\/www.youtube.com\/@DIGITALbusinessafrica"]},{"@type":"Person","@id":"https:\/\/www.digitalbusiness.africa\/en\/#\/schema\/person\/ff3c1f37f3f78ad65e9c4800c0447708","name":"Digital Business Africa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b9e4a1bc2f72a65580318195742699c9067d8f5c29bc6f8868a76454109f5803?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b9e4a1bc2f72a65580318195742699c9067d8f5c29bc6f8868a76454109f5803?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9e4a1bc2f72a65580318195742699c9067d8f5c29bc6f8868a76454109f5803?s=96&d=mm&r=g","caption":"Digital Business Africa"},"description":"DIGITAL Business Africa est la plateforme d'infos strat\u00e9giques sur le secteur des TIC, des T\u00e9l\u00e9coms et du Num\u00e9rique en Afrique. Son Directeur de publication est Beaugas Orain DJOYUM , journaliste et consultant en e-R\u00e9putation, en communication digitale et en veille strat\u00e9gique. Pour le contact : contact@digitalbusiness.africa. T\u00e9l\u00e9phone : +237 243 25 64 36","sameAs":["https:\/\/www.facebook.com\/DigitalBusinessAFRIC","https:\/\/fr.linkedin.com\/company\/tic-mag","https:\/\/www.youtube.com\/user\/TICMag\/"],"url":"https:\/\/www.digitalbusiness.africa\/en\/author\/kina\/"}]}},"jetpack_featured_media_url":"https:\/\/www.digitalbusiness.africa\/wp-content\/uploads\/2021\/11\/50365-210114_Labs_DNS_Kongo_Hijack.png","_links":{"self":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts\/50382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/comments?post=50382"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts\/50382\/revisions"}],"predecessor-version":[{"id":107892,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/posts\/50382\/revisions\/107892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/media\/50367"}],"wp:attachment":[{"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/media?parent=50382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/categories?post=50382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalbusiness.africa\/en\/wp-json\/wp\/v2\/tags?post=50382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}