Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Exploits and Vulnerabilities»Cybersecurity Alert: Risks of Abandoned Websites
    Exploits and Vulnerabilities

    Cybersecurity Alert: Risks of Abandoned Websites

    By Laura SuarezJanuary 14, 2025Updated:January 17, 20253 Mins Read
    Cybercrimal using a key to obtain data not meant for them.
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    A recent report from cybersecurity company watchTowr Labs revealed an alarming way that hackers exploit outdated systems: by taking control of abandoned websites.1 Their research showed that more than 4,000 hacked systems, including those belonging to governments, universities, and businesses, were still trying to communicate with these expired websites, which hackers once used to control compromised systems. This discovery highlights the ongoing risks posed by forgotten digital infrastructure and what we can do to protect ourselves.

    Breaking Down the Findings

    The report detailed how watchTowr Labs acquired over 40 expired website domains for just $20 each. These websites had previously been used by hackers as command-and-control servers, which are systems designed to send instructions to hacked devices or collect stolen data. When the domains expired, watchTowr Labs purchased them and observed the activity of compromised systems that were still trying to connect.

    The compromised systems included government entities, academic institutions, and private companies. Many of these systems had backdoors installed, which are hidden pathways that allow attackers to regain access whenever they want. Some backdoors were simple tools that enabled hackers to execute basic commands, while others were advanced programs capable of stealing data, brute-forcing passwords, and even removing themselves to evade detection. The researchers also discovered that some of these backdoors contained vulnerabilities, meaning hackers unknowingly created tools that could be exploited by other attackers.

    This isn’t just a problem for businesses or foreign governments; universities are common targets for cyberattacks. The report identified compromised systems belonging to academic institutions in China, South Korea, and Thailand, highlighting how educational networks, with their large number of users and devices, can be exploited.

    What This Means for Students

    While this specific incident didn’t target Fordham University, the findings highlight how similar vulnerabilities could impact any university, including ours. Large networks like those at universities are especially vulnerable to cyberattacks because of the variety of users and devices connected to them. Here’s how you could be affected:

    • Compromised Devices – If hackers can install backdoors on personal or university-owned devices, they can access sensitive data like personal information, academic records, or research.
    • Targeted Phishing Campaigns – Hackers often use phishing emails to install backdoors. Clicking a suspicious link could lead to your devices being compromised.
    • Impact on University Services – Compromised systems can lead to disruptions in university operations, such as delayed access to email, course materials, etc.

    How Can You Protect Yourself?

    • Be Cautious with Emails – Always be wary of unexpected emails, especially those asking you to click links or download files. If you suspect an email is phishing, report it using the PhishAlarm tool in your Gmail inbox. It’s an icon on the right side of your screen that looks like a hook with an envelope. This tool not only removes the email from your inbox but also alerts the university’s cybersecurity team.
    • Stay Updated – Keep your devices updated with the latest software and security patches. Outdated systems are easier for hackers to exploit.
    • Use University IT Services – If you experience a technical issue or suspect your account or device has been compromised, contact the IT Service Desk immediately:
      • Call 718-817-3999 anytime.
      • Email HelpIT@Fordham.edu or visit the Tech Help portal through My Pages on Fordham’s website.

    1. Lakshmanan, Ravie. “Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems.” The Hacker News. 13 Jan. 2025, https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html ↩︎

    Like this:

    Like Loading...
    Exploits and Vulnerabilities News and Events Privacy
    Previous ArticleDHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Next Article Stay Ahead of Scammers in 2025

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Stay Ahead of Scammers in 2025

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d