domaindetails.com
Knowledge Base/Security & Privacy/How to Recover a Hijacked Domain: Complete Recovery Guide (2025)
Security & Privacy

How to Recover a Hijacked Domain: Complete Recovery Guide (2025)

Domain hijacked? Act fast. Complete guide to recovering stolen domains including immediate actions, registrar contacts, legal options, and prevention for the future.

16 min
Published 2025-12-01
Updated 2025-12-01
By DomainDetails Team

Quick Answer

If your domain has been hijacked, act immediately. Contact your registrar's abuse/security team within hours (not days) and request they lock the domain. Simultaneously contact the gaining registrar if transferred. Document everything: WHOIS history, screenshots, timeline, proof of ownership. File complaints through ICANN's Transfer Dispute Resolution Policy (TDRP) for unauthorized transfers, or UDRP for trademark violations. Change all account passwords and enable 2FA. Most recoveries succeed when action is taken within 24-48 hours—delays significantly reduce recovery chances.

Table of Contents

Understanding Domain Hijacking

Domain hijacking (also called domain theft) occurs when someone gains unauthorized control of your domain name and transfers it away from your account or registrar without your permission.

How Hijacking Occurs

Common attack vectors:

  1. Compromised registrar account

    • Stolen password (phishing, data breach, keylogger)
    • Weak security (no 2FA, reused passwords)
    • Social engineering of registrar support
  2. Compromised email account

    • Password reset links intercepted
    • Transfer confirmation emails approved
    • Account change notifications deleted
  3. Registrar security failures

    • Support staff fooled by social engineering
    • Inadequate identity verification
    • Insider threats
  4. Social engineering

    • Impersonation of domain owner
    • Fake identity documents
    • Manipulation of support personnel

Signs Your Domain Was Hijacked

Symptom What It Means
Website suddenly offline DNS changed or domain suspended
Email stops working MX records changed or domain transferred
Unexpected transfer email Domain moved to another registrar
Can't log into registrar Password changed or account compromised
WHOIS shows different registrar Transfer already completed
WHOIS shows different contact info Registration data changed
Unknown nameservers in WHOIS DNS control transferred
clientTransferProhibited removed Lock disabled (precursor to transfer)

Why Time is Critical

Hours matter:

  • First 5 days: Transfer can be rejected by gaining registrar
  • First 24 hours: Easiest window for registrar intervention
  • After transfer completes: Significantly harder to reverse
  • After multiple transfers: Much harder to trace and reverse
  • After 60+ days: Statute of limitations issues may arise

The sooner you act, the more likely you are to recover your domain intact.

Immediate Actions: First 24 Hours

When you discover your domain has been hijacked, follow these steps immediately—preferably within the first hour.

Step 1: Verify the Hijacking

Before panicking, confirm hijacking actually occurred:

  1. Check WHOIS data

    • Run WHOIS lookup on your domain
    • Verify registrar hasn't changed
    • Check contact information is still yours
    • Note nameserver changes
  2. Try logging into your account

    • Attempt login at your registrar
    • Try password reset
    • Check if email address was changed
  3. Check your email

    • Search for transfer notifications
    • Look for password reset emails you didn't request
    • Check spam/trash folders
    • Review sent folder for sent emails you didn't send

If WHOIS shows a different registrar or contact info: You've been hijacked.

Step 2: Contact Your Original Registrar

Call, don't email—this is urgent:

  1. Find abuse/security contact:

  2. Explain the situation clearly:

    • "My domain [name] was stolen without authorization"
    • "I did not initiate this transfer"
    • "This is an unauthorized account access"
    • Request immediate domain lock
  3. Request specific actions:

    • Lock the domain immediately
    • Reverse any recent changes
    • Investigate how access was gained
    • Provide case/ticket number for documentation
  4. Document the interaction:

    • Note case number
    • Record agent name and time
    • Save email confirmations
    • Screenshot all communications

Step 3: Contact the Gaining Registrar

If your domain was transferred to another registrar:

  1. Identify the new registrar (via WHOIS lookup)

  2. Contact their abuse department immediately:

    • Report the domain as stolen
    • Request they lock the domain
    • Ask them to investigate the transfer
    • Provide proof of ownership
  3. Common abuse contacts:

  4. Be professional but firm:

    • Clearly state the domain was stolen
    • Provide timeline of events
    • Request reversal of transfer
    • Mention ICANN TDRP if needed

Immediately change passwords for:

  • Your registrar account
  • Email associated with domain
  • Other domains at same registrar
  • Hosting accounts
  • Payment methods

Enable 2FA on:

  • Registrar accounts (all of them)
  • Email accounts
  • Password manager
  • Any account with sensitive access

Check for:

  • Unknown login sessions
  • Unauthorized email forwarding rules
  • New recovery emails/phones added
  • Recent password changes on other accounts

Contacting Your Registrar

Your original registrar is your first line of defense in recovery.

What to Say

Initial contact template:

Subject: URGENT - Domain Hijacking Report - [YourDomain.com]

I am the legitimate owner of [YourDomain.com] which was hijacked
without my authorization on [Date].

Account Details:
- Domain: [YourDomain.com]
- Account: [Username/Email]
- Registration Date: [Original date]
- Current Status: [Transferred/Locked/Suspended]

Evidence of Ownership:
- Original registration email attached
- Payment records attached
- Account access history shows unauthorized access [Date/Time]

I did NOT:
- Initiate any transfer
- Approve any transfer emails
- Request any account changes
- Change my password on [suspicious date]

I request immediate action:
1. Lock the domain immediately
2. Reverse the unauthorized transfer
3. Investigate the security breach
4. Restore original settings

I am available at [Phone] for verification.

This is a time-sensitive security emergency.

[Your Name]
[Account Verification Details]

Information to Provide

Proof of ownership:

  • Original registration confirmation email
  • Payment receipts for domain/renewals
  • Historical WHOIS records (via DomainTools/WHOIS History)
  • Account creation date
  • Previous support ticket numbers
  • Payment method details (last 4 digits of card)
  • Previous IP addresses you logged in from
  • Detailed account history

Timeline documentation:

  • When you last accessed the account
  • When you discovered the hijacking
  • When unauthorized changes occurred
  • Any suspicious emails received

Registrar Response Expectations

Best case: Registrar immediately locks domain and initiates reversal process.

Common case: Registrar opens investigation, requests verification, provides timeline (3-7 days).

Worst case: Registrar claims they cannot intervene and refers you to ICANN dispute process.

If Your Registrar Won't Help

Escalation steps:

  1. Request escalation to supervisor

    • Ask for security team lead
    • Request case be escalated to legal department
  2. Reference ICANN policies

    • Transfer Policy requires registrar cooperation
    • TDRP provides dispute mechanism
    • Registrar agreement mandates security standards
  3. File ICANN complaint

  4. Public pressure (last resort)

    • Post to domain forums (NamePros)
    • Tweet at registrar (they often respond faster)
    • Review sites (TrustPilot, BBB)
    • Domain industry press (Domain Name Wire)

Contacting the Gaining Registrar

The registrar who received your domain has obligations to investigate theft reports.

Why They Should Help

ICANN Transfer Policy requires:

  • Reasonable investigation of theft claims
  • Cooperation with legitimate owners
  • Reversal of fraudulent transfers
  • Documentation of verification procedures

Most registrars:

  • Don't want to harbor stolen domains
  • Face compliance risks
  • Value their reputation
  • Want to avoid legal liability

How to Contact Them

Email the abuse department:

Subject: Stolen Domain Report - [YourDomain.com]

To: Abuse Department

I am reporting that [YourDomain.com] was fraudulently transferred
to your registrar on [Date] without my authorization.

Transfer Details:
- Domain: [YourDomain.com]
- Transfer Date: [Date from WHOIS]
- Losing Registrar: [Previous registrar]
- Current Status: Registered at [Their registrar]

I am the legitimate owner and did NOT authorize this transfer.

Evidence:
- Proof of ownership attached
- Timeline of unauthorized access
- Original registrar's case #[Number]
- WHOIS history showing my ownership

I request:
1. Immediate lock of the domain
2. Investigation of the transfer
3. Reversal to original registrar
4. Contact information of account holder

Under ICANN's Transfer Dispute Resolution Policy (TDRP), I am
entitled to investigation and potential reversal of this
unauthorized transfer.

I am prepared to file formal TDRP complaint if necessary.

[Your Contact Information]
[Supporting Documentation Links]

Follow-Up Actions

If they respond positively:

  • Provide requested verification immediately
  • Stay in regular communication
  • Request timeline for resolution
  • Ask for written confirmation of actions taken

If they don't respond within 48 hours:

  • Call their support line directly
  • Send follow-up email referencing ICANN TDRP
  • Copy your original registrar on communication
  • Prepare to file formal TDRP complaint

If they refuse to help:

  • Document their refusal
  • Note the reasons they provided
  • Proceed to ICANN TDRP filing
  • Consider legal counsel if domain is high-value

Documenting the Hijacking

Thorough documentation is critical for recovery and potential legal action.

What to Document

1. Timeline of Events

Create detailed chronology:

  • Last time you successfully accessed the domain/account
  • When you first noticed something wrong
  • When unauthorized changes occurred (per WHOIS history)
  • When you contacted registrars
  • All subsequent events

Example format:

2025-11-28 9:00 AM - Last successful login to registrar account
2025-11-29 2:34 PM - Unauthorized password change (per registrar logs)
2025-11-29 2:41 PM - Domain lock removed
2025-11-29 3:15 PM - Transfer initiated to NewRegistrar
2025-11-30 8:00 AM - Discovered website offline
2025-11-30 8:15 AM - Contacted GoDaddy abuse (Case #12345)
2025-11-30 8:30 AM - Contacted NewRegistrar abuse

2. WHOIS Records

Capture historical WHOIS data:

  • Current WHOIS (as soon as you discover hijacking)
  • Previous WHOIS showing your ownership
  • Any intermediate WHOIS data
  • WHOIS history from services like:
    • DomainTools
    • WHOIS History
    • SecurityTrails

3. Screenshots

Capture evidence visually:

  • Current WHOIS data
  • Your registrar account (if accessible)
  • Website showing offline/wrong content
  • Email confirmations of domain registration
  • Payment records
  • Transfer notification emails
  • Account activity logs
  • Support ticket conversations

4. Email Evidence

Save all emails related to:

  • Original domain registration
  • Renewal confirmations
  • Unauthorized transfer notifications
  • Password reset attempts you didn't make
  • Support communications
  • Suspicious phishing emails

5. Proof of Ownership

Gather everything proving you own the domain:

  • Registration confirmation email
  • Credit card statements showing domain charges
  • Renewal receipts
  • Historical DNS records you configured
  • Website content you created
  • Email correspondence sent from the domain
  • Business registration showing domain ownership
  • Tax records (if business expense)
  • Historical backups of website

6. Communication Records

Document all recovery attempts:

  • Registrar support tickets (case numbers)
  • Phone call logs (date, time, agent name)
  • Email threads
  • Responses received
  • Actions promised

Organizing Documentation

Create a folder structure:

DomainRecovery_YourDomain_2025/
├── Timeline.txt
├── WHOIS/
│   ├── current_whois_2025-11-30.txt
│   ├── historical_whois_2024.txt
│   └── domaintools_history.pdf
├── Screenshots/
│   ├── whois_evidence.png
│   ├── registrar_account.png
│   └── offline_website.png
├── Emails/
│   ├── original_registration.pdf
│   ├── unauthorized_transfer.pdf
│   └── support_communications.pdf
├── Proof_of_Ownership/
│   ├── registration_receipt.pdf
│   ├── credit_card_statements.pdf
│   └── business_registration.pdf
└── Legal/
    ├── TDRP_filing.pdf
    └── attorney_correspondence.pdf

Keep backups:

  • Cloud storage (Google Drive, Dropbox)
  • Local hard drive
  • USB drive
  • Print critical documents

This documentation will be essential for ICANN disputes, legal action, and insurance claims.

Filing a TDRP Complaint

ICANN's Transfer Dispute Resolution Policy (TDRP) addresses unauthorized transfers.

What is TDRP?

TDRP (Transfer Dispute Resolution Policy):

  • ICANN-mandated dispute process
  • Specifically for unauthorized transfers
  • Faster than UDRP
  • Can result in domain being returned to original registrar
  • Free to file (no filing fee)

When to use TDRP:

  • Domain transferred without your authorization
  • Transfer violated ICANN Transfer Policy
  • Registrars won't cooperate in reversal
  • Need formal mechanism to force action

TDRP Filing Process

Step 1: Exhaust Registrar Remedies

You must first attempt resolution with:

  • Your losing registrar (original)
  • The gaining registrar (current)
  • Document their responses (or lack of response)

ICANN requires:

  • At least 7 days for registrars to respond
  • Good faith effort to resolve directly
  • Documentation of these attempts

Step 2: File Complaint with Registrar

If registrars don't resolve it, formally file with the gaining registrar:

Components of filing:

  1. Written complaint describing unauthorized transfer
  2. Evidence of ownership
  3. Timeline of events
  4. Explanation why transfer was unauthorized
  5. Request for specific remedy (return domain)

Send to:

  • Gaining registrar's TDRP contact (find on ICANN registrar list)
  • Use certified mail or email with read receipt
  • Keep copies of everything

Step 3: Registrar Decision

Gaining registrar must:

  • Review your complaint
  • Investigate the transfer
  • Make determination within reasonable timeframe
  • Either reverse transfer or deny complaint

If registrar reverses: Domain returns to original registrar (success!).

If registrar denies: You can escalate to ICANN dispute provider.

Step 4: Escalate to Dispute Provider

If registrar denies your complaint, escalate to ICANN-approved dispute provider:

Providers:

  • National Arbitration Forum (NAF)
  • Asian Domain Name Dispute Resolution Centre (ADNDRC)

File formal TDRP complaint:

  • Use provider's online filing system
  • Submit all documentation
  • Pay filing fee (if required—varies by provider)
  • Wait for provider decision

Step 5: Decision and Appeal

Provider will:

  • Review evidence from both sides
  • Make determination based on ICANN policy
  • Issue binding decision

Possible outcomes:

  1. Transfer reversed: Domain returned to you (win)
  2. Transfer upheld: Current registrant keeps domain (loss)
  3. Partial remedy: Compromise solution

Appeals: Limited appeal rights depending on specific circumstances.

Timeline Expectations

Phase Duration
Registrar attempts 7-14 days
Formal complaint to registrar 7-10 days
Registrar investigation 10-20 days
Escalation to provider Immediate
Provider review 30-45 days
Decision Immediate after review
Total 2-3 months

Cost

TDRP is generally free or low cost:

  • No ICANN filing fee for initial complaint
  • Registrars handle most cases internally
  • Provider fees (if escalated): Varies, typically $100-$500
  • Attorney fees: Optional but recommended for high-value domains

Filing a UDRP Complaint

If your domain hijacking involves trademark issues, UDRP may be appropriate.

What is UDRP?

UDRP (Uniform Domain-Name Dispute-Resolution Policy):

  • For trademark-related domain disputes
  • Addresses cybersquatting and bad-faith registration
  • Takes 2-3 months
  • Costs $1,500-$4,000
  • Can result in domain transfer or cancellation

When to Use UDRP Instead of TDRP

Use UDRP if:

  • Domain contains your trademark
  • Hijacker is cybersquatting or squatting
  • Registration (by hijacker) was in bad faith
  • You have registered trademark
  • TDRP failed or doesn't apply

Use TDRP if:

  • Issue is purely unauthorized transfer
  • No trademark involved
  • You just want domain back

UDRP Requirements

To win UDRP, you must prove:

1. Domain is identical or confusingly similar to your trademark

  • You have trademark rights (registered or common law)
  • Domain name matches trademark

2. Current registrant has no legitimate rights

  • They're not using domain legitimately
  • No authorization from you
  • Not commonly known by that name

3. Domain registered and used in bad faith

  • Stolen to sell back to you (ransom)
  • Disrupting your business
  • Confusing your customers
  • Pattern of hijacking domains

UDRP Filing Process

Step 1: Choose Provider

ICANN-approved providers:

  • WIPO (World Intellectual Property Organization)
  • NAF (National Arbitration Forum)
  • ADNDRC (Asian Domain Name Dispute Resolution Centre)

Most popular: WIPO (most cases filed here)

Step 2: Prepare Complaint

Required elements:

  1. Your contact information
  2. Domain name in dispute
  3. Registrar information
  4. Grounds for complaint (prove 3 elements above)
  5. Evidence of trademark rights
  6. Evidence of bad faith
  7. Requested remedy (transfer domain to you)

Evidence to include:

  • Trademark registration certificates
  • Evidence domain was stolen (timeline, WHOIS history)
  • Proof you're the legitimate owner
  • Evidence of hijacker's bad faith
  • Screenshots, emails, documentation

Step 3: Submit and Pay

Filing online:

  • Use provider's filing system (e.g., WIPO eADR)
  • Upload all documents
  • Pay filing fee

Fees (WIPO 2025):

  • Single panelist: $1,500
  • Three panelists: $4,000
  • Additional fees for multiple domains

Step 4: Respondent Has Opportunity to Respond

After filing:

  • Registrar verifies submission is in order
  • Respondent (hijacker) notified
  • Respondent has 20 days to file response
  • They may defend, ignore, or negotiate

Step 5: Panel Review and Decision

Panel process:

  • Expert panelist(s) review both sides
  • Evaluate evidence against UDRP criteria
  • Issue decision

Timeline: 45-60 days from filing

Possible outcomes:

  1. Complaint granted: Domain transferred to you
  2. Complaint denied: Current registrant keeps domain
  3. Complaint withdrawn: You withdraw or settle

Timeline

Phase Duration
Prepare and file complaint 1-2 weeks
Provider review 3-5 days
Respondent notification Immediate
Respondent response period 20 days
Panel appointment 3-5 days
Panel decision 14-21 days
Total 2-3 months

Cost Analysis

UDRP costs:

  • Filing fee: $1,500-$4,000
  • Attorney fees: $2,000-$10,000+ (optional but recommended)
  • Total: $3,500-$14,000+

Worth it if:

  • Domain is business-critical
  • Domain has high value (>$10,000)
  • Trademark infringement is clear
  • You have strong evidence

Not worth it if:

  • Domain has minimal value
  • Trademark case is weak
  • Hijacker may return domain cheaper
  • TDRP is appropriate alternative

For high-value domains or when administrative processes fail, legal action may be necessary.

Appropriate if:

  • Domain is extremely valuable ($25,000+)
  • Business is severely impacted
  • TDRP/UDRP failed
  • Criminal activity is evident
  • Damages are substantial
  • You have solid evidence

Not recommended if:

  • Domain has low value
  • Evidence is weak
  • Legal costs exceed domain value
  • Faster alternatives exist

1. Civil Lawsuit

Claims you can make:

  • Theft/conversion of property
  • Trademark infringement (if applicable)
  • Cybersquatting (ACPA - Anticybersquatting Consumer Protection Act)
  • Breach of contract (if registrar violated terms)
  • Fraud
  • Tortious interference with business

Potential remedies:

  • Transfer of domain to you
  • Monetary damages
  • Attorney's fees (in some cases)
  • Injunctive relief

Where to file:

  • Federal court (for ACPA, trademark claims)
  • State court (for theft, fraud claims)
  • Jurisdiction: Where you are, where defendant is, or where registrar is

Cost: $10,000-$100,000+ in legal fees

Timeline: 1-3 years

2. Anticybersquatting Consumer Protection Act (ACPA)

Federal law (USA only):

  • Addresses cybersquatting and domain hijacking
  • Requires bad faith registration or use
  • Requires trademark rights
  • Statutory damages up to $100,000 per domain
  • Attorney's fees possible

Advantages over UDRP:

  • Monetary damages possible
  • More discovery available
  • Court order is enforceable
  • Can sue multiple parties

Requirements:

  • You have trademark rights
  • Domain is identical or confusingly similar
  • Bad faith intent by hijacker

3. Criminal Charges

Domain hijacking may constitute:

  • Computer Fraud and Abuse Act (CFAA) violation
  • Identity theft
  • Wire fraud
  • Extortion (if ransom demanded)

How to pursue:

  • File report with local police
  • Report to FBI (IC3.gov)
  • Report to Secret Service (if commercial)
  • Provide all evidence

Challenges:

  • Law enforcement may not prioritize
  • Jurisdictional issues
  • International hijackers hard to prosecute
  • Long timelines

Better for:

  • Deterrence
  • Evidence gathering
  • Parallel to civil action
  • High-profile cases

Finding an Attorney

Look for:

  • Intellectual property attorneys
  • Internet law specialists
  • Domain name dispute experience
  • UDRP/ACPA experience
  • Good track record

Where to find:

  • State bar association referrals
  • Martindale-Hubbell directory
  • Internet law directories
  • Domain investor forums recommendations
  • WIPO panelist directories (attorneys who handle cases)

Questions to ask:

  • How many domain cases have you handled?
  • What's your success rate?
  • What's your fee structure?
  • What's the realistic timeline?
  • What are my chances of success?
  • What will total costs be?

Cost-Benefit Analysis

Calculate:

  • Legal fees: $10,000-$100,000+
  • Filing fees: $400-$1,000
  • Expert witness fees: $5,000-$20,000
  • Discovery costs: $5,000-$30,000
  • Time investment: Substantial

Compare to:

  • Domain's actual value
  • Domain's value to your business
  • Cost of rebranding
  • Likelihood of success
  • Alternative dispute costs (UDRP ~$4,000)

General rule: Only pursue legal action if domain value and business impact exceed $50,000.

Working with Law Enforcement

For criminal aspects of domain hijacking, law enforcement involvement may help.

When to Involve Police

Contact law enforcement if:

  • Clear evidence of criminal hacking
  • Identity theft occurred
  • Financial fraud involved
  • Ransom or extortion attempted
  • Part of larger criminal enterprise
  • Hijacker's identity is known

How to Report

1. Local Police

Report to your local police department:

  • File a report in person
  • Bring all documentation
  • Explain the crime clearly (use analogies: "like stealing my car")
  • Get case number

Challenges:

  • May not understand technical details
  • May not prioritize (not physical crime)
  • Limited jurisdiction
  • Unlikely to investigate actively

Still worth it for:

  • Official crime report (documentation)
  • Insurance claims
  • Supporting civil case
  • If hijacker is local

2. FBI (United States)

Internet Crime Complaint Center (IC3):

  • Website: www.ic3.gov
  • Online reporting system
  • FBI-run complaint center
  • Free to file

Information to provide:

  • Detailed timeline
  • Financial loss amount
  • Technical details
  • Suspect information (if known)
  • Evidence of crime

Realistic expectations:

  • FBI investigates cases meeting thresholds:
    • High dollar amounts ($100,000+)
    • Multiple victims (patterns)
    • National security implications
  • Individual domain theft unlikely to trigger investigation
  • Report still creates official record

3. Secret Service (United States)

U.S. Secret Service investigates:

  • Commercial cybercrime
  • High-value fraud cases
  • Identity theft rings
  • Financial crimes

Contact:

  • Local Secret Service field office
  • Electronic Crimes Task Force
  • Provide detailed evidence

More likely to investigate if:

  • Commercial/business domain
  • Substantial financial impact
  • Part of larger criminal scheme
  • Business disruption is severe

4. International Agencies

For international hijackers:

  • Interpol: International coordination
  • Europol: European crimes
  • Country-specific cybercrime units: Many countries have dedicated teams

Challenges:

  • Jurisdictional complexity
  • Lack of cooperation
  • Different laws
  • Language barriers

What Law Enforcement Can Do

If they investigate:

  • Subpoena records from registrars/ISPs
  • Trace IP addresses and logins
  • Identify suspects
  • Coordinate with international partners
  • Seize domains (in some cases)
  • File criminal charges

Realistic outcomes:

  • Official crime report (useful for insurance, lawsuits)
  • Possible investigation (if high profile or part of pattern)
  • Recovery unlikely through criminal process alone
  • Deterrent effect if hijacker is prosecuted

Using Criminal Reports in Civil Cases

Police reports are useful for:

  • Documenting the crime officially
  • Supporting civil lawsuits
  • Insurance claims
  • ICANN dispute processes
  • Demonstrating seriousness

Include in:

  • UDRP/TDRP filings
  • Civil complaint exhibits
  • Communications with registrars
  • Settlement negotiations

Securing Your Accounts

After hijacking, secure ALL accounts to prevent repeat attacks.

Immediate Security Steps

1. Change All Passwords

Update passwords for:

  • All domain registrar accounts
  • Email accounts (especially domain admin email)
  • Hosting accounts
  • DNS management accounts
  • Website admin panels
  • Payment processors
  • Any account related to the domain

Password requirements:

  • Minimum 20 characters
  • Unique for every account
  • Use password manager to generate and store
  • Never reuse passwords

2. Enable Two-Factor Authentication

Enable 2FA on:

  • Every registrar account
  • Email accounts
  • Password manager
  • Hosting accounts
  • Any account with domain access

Use authenticator apps (not SMS):

  • Authy
  • Google Authenticator
  • Microsoft Authenticator
  • 1Password (built-in)

Why not SMS: SIM swapping attacks can intercept SMS codes.

3. Review Account Access

Check for unauthorized access:

  • Review login history at all registrars
  • Check active sessions
  • Look for unfamiliar IP addresses
  • Terminate all active sessions
  • Review account changes (email, phone, contacts)

4. Check Email Security

Secure your email account:

  • Remove forwarding rules
  • Check for unknown recovery emails/phones
  • Review connected apps/devices
  • Check sent folder for sent emails you didn't send
  • Enable login alerts

5. Review Payment Methods

Update payment security:

  • Check for unauthorized charges
  • Update credit card if compromised
  • Remove old payment methods
  • Enable transaction alerts
  • Consider virtual card numbers for registrar payments

Ongoing Security Practices

Monthly tasks:

  • Review account login history
  • Verify domain locks are enabled
  • Check WHOIS data hasn't changed
  • Audit active sessions
  • Review connected devices/apps

Quarterly tasks:

  • Change critical passwords
  • Review security settings
  • Update recovery information
  • Test 2FA backup codes
  • Audit all domain accounts

Annual tasks:

  • Full security audit
  • Review registrar security features
  • Consider upgrading to registry lock (high-value domains)
  • Document all domains and credentials
  • Update emergency contact procedures

Recovery Timeline Expectations

Understanding realistic timelines helps set expectations.

Best Case Scenario

If you act immediately and registrars cooperate:

Timeframe Action
Hour 1 Discover hijacking, contact registrars
Hours 2-4 Registrars lock domain
Day 1 Investigation begins
Days 2-3 Ownership verified
Days 3-5 Transfer reversed
Day 7 Domain fully restored
Total: 1 week Complete recovery

Requirements:

  • Immediate action (within hours)
  • Clear proof of ownership
  • Cooperative registrars
  • Transfer not yet completed
  • No complications

Typical Scenario

With registrar cooperation and TDRP:

Timeframe Action
Day 1 Discovery and initial contact
Days 2-7 Registrar attempts at resolution
Days 8-14 Formal TDRP complaint filed
Days 15-30 Registrar investigation
Days 31-45 Escalation to ICANN provider (if needed)
Days 46-90 Provider review and decision
Days 91-100 Transfer reversed
Total: 2-3 months Complete recovery

Requirements:

  • Action within days
  • Proof of ownership available
  • One or both registrars need persuading
  • May need ICANN escalation

Worst Case Scenario

If UDRP or legal action is required:

Timeframe Action
Month 1 TDRP attempts fail
Month 2 Prepare UDRP/legal case
Month 3 File UDRP complaint
Months 4-5 UDRP process
Month 6 UDRP decision (if won)
Alternative: Months 6-36 Civil litigation
UDRP: 6 months Complete recovery
Litigation: 1-3 years Complete recovery

Complications:

  • Multiple transfers
  • International jurisdictions
  • Uncooperative registrars
  • Weak evidence
  • Sophisticated hijacker
  • Legal challenges

When Recovery Fails

Sometimes domains are not recoverable:

  • Hijacker operates from non-cooperative country
  • Evidence is insufficient
  • Domain has been sold to good-faith third party
  • Too much time has passed
  • Legal costs exceed domain value
  • Registrars refuse to cooperate

In these cases:

  • Consider negotiating purchase from current holder
  • Rebrand to new domain
  • Focus on preventing future incidents
  • Pursue damages rather than domain recovery

When Recovery Is Not Possible

Some domains cannot be recovered—know when to move on.

Unrecoverable Situations

1. Sold to Good-Faith Third Party

If hijacker sold domain to innocent buyer:

  • Third party has legitimate ownership claim
  • They paid fair value
  • They had no knowledge of theft
  • Courts often protect good-faith purchasers

Your options:

  • Pursue hijacker for damages (if identifiable)
  • Negotiate purchase from current owner
  • Focus on other remedies

2. Jurisdictional Obstacles

If hijacker and domain are in country with:

  • No domain law enforcement
  • Corrupt legal system
  • No international cooperation
  • No ICANN oversight mechanisms

Your options:

  • Extremely limited
  • Likely must rebrand
  • Focus on prevention for other domains

3. Insufficient Evidence

If you cannot prove:

  • Your ownership
  • Unauthorized nature of transfer
  • Timeline of events
  • Identity of hijacker

Why this happens:

  • No documentation kept
  • Email accounts deleted
  • Old registration records lost
  • No WHOIS history available

Lesson: Document everything immediately.

4. Cost Exceeds Value

If domain value < recovery costs:

  • UDRP: ~$4,000-$15,000
  • Litigation: $50,000-$200,000
  • Time investment: Substantial

Calculate:

  • Domain replacement cost
  • Rebranding cost
  • Recovery costs and likelihood
  • Make rational decision

5. Too Much Time Has Passed

Statute of limitations varies:

  • UDRP: No hard time limit, but staleness matters
  • TDRP: Should file within months
  • Civil suits: 1-6 years depending on jurisdiction
  • Criminal: Varies widely

Delays hurt because:

  • Evidence disappears
  • Witnesses forget
  • Registrars are less cooperative
  • Domains change hands multiple times

Making the Decision

Ask yourself:

  1. What are realistic recovery odds? (<30% means unlikely)
  2. What will recovery cost in money and time?
  3. What's the domain actually worth?
  4. What's rebranding cost?
  5. Is this about principle or practical value?

If recovery costs exceed 2x domain value: Consider moving on.

Alternatives to Recovery

Option 1: Negotiate Purchase

  • Contact current holder
  • Offer to buy domain
  • Use escrow service
  • May be cheaper than legal battle

Option 2: Rebrand

  • Choose new domain name
  • Redirect old domain if possible
  • Update all marketing materials
  • Announce rebrand publicly
  • Turn it into marketing opportunity

Option 3: Pursue Damages Instead

  • Sue hijacker for monetary damages
  • Seek compensation, not domain return
  • May be more achievable
  • Document all losses

Option 4: Focus on Prevention

  • Secure all other domains
  • Implement comprehensive security
  • Learn from experience
  • Help others avoid same fate

Lessons from Loss

Every hijacking teaches:

  • Security weaknesses in your systems
  • Importance of documentation
  • Value of proactive monitoring
  • Need for insurance/redundancy
  • Incident response planning

Use the experience to:

  • Improve security across all assets
  • Create better backup plans
  • Document everything properly
  • Help others avoid same mistakes
  • Build better processes

Preventing Future Hijacking

Once recovered, prevent repeat incidents.

Essential Security Measures

1. Enable All Domain Locks

  • Registrar Lock (clientTransferProhibited)

    • Prevents transfers between registrars
    • Enable at your registrar dashboard
    • Free and immediate
  • Registry Lock (serverTransferProhibited)

    • Higher-level lock at registry
    • Requires manual process to unlock
    • Usually $25-$100/year per domain
    • Essential for high-value domains
  • DNSSEC

    • Protects DNS from hijacking
    • Adds cryptographic signatures
    • Enable at registrar or DNS host

2. Implement Strong Authentication

  • Use unique 20+ character passwords for each account
  • Enable 2FA with authenticator app (not SMS)
  • Save 2FA backup codes securely
  • Use hardware security keys for critical accounts (YubiKey)
  • Never reuse passwords across accounts

3. Secure Your Email

  • Enable 2FA on email account
  • Use email provider with strong security (Gmail, ProtonMail)
  • Add recovery email and phone
  • Enable login alerts
  • Review connected apps regularly
  • Add PIN to mobile carrier account (prevent SIM swapping)

4. Monitor Your Domains

  • Set up WHOIS monitoring alerts
  • Monitor DNS/nameserver changes
  • Monitor domain status codes
  • Check WHOIS data monthly
  • Use monitoring service (DomainDetails Pro, DomainTools)

5. Use Security-Focused Registrar

Consider transferring to registrars with strong security:

  • Cloudflare Registrar: Security-first design
  • Namecheap: Good security features
  • MarkMonitor: Enterprise-grade security
  • CSC: Corporate domain protection

Look for:

  • Mandatory 2FA
  • Registry lock option
  • Activity logs
  • Login notifications
  • Dedicated security team
  • Good reputation

6. Separate Critical Assets

  • Use different registrars for different domain portfolios
  • Don't keep all domains in one account
  • Use separate email addresses for domain accounts
  • Segregate personal and business domains
  • Limit who has access to accounts

7. Document Everything

  • Keep records of all domain registrations
  • Save all confirmation emails
  • Document payment history
  • Store WHOIS history
  • Keep screenshots of domain settings
  • Backup website and email data
  • Store documentation securely offsite

Business-Specific Protections

For companies:

  • Implement role-based access control
  • Require two-person approval for transfers
  • Conduct quarterly domain audits
  • Have incident response plan
  • Train employees on social engineering
  • Use enterprise registrar services
  • Consider domain insurance
  • Maintain offline backups of all credentials

Insurance Options

Cyber insurance may cover:

  • Domain theft and recovery costs
  • Business interruption losses
  • Legal fees
  • Ransom payments (controversial)
  • Reputation recovery costs

Check your policy for:

  • Domain theft coverage
  • Recovery cost limits
  • Deductibles
  • Exclusions

Best Practices

If Hijacking Occurs

  • Act within hours, not days—every hour matters for recovery odds
  • Call registrars immediately—phone calls get faster response than email
  • Document everything in real-time—timeline, screenshots, communications
  • Secure all related accounts immediately—assume everything is compromised
  • Don't pay ransom—encourages repeat attacks and may not work
  • Stay persistent—recovery often requires multiple escalations
  • Be professional but firm—emotion doesn't help, facts do

For Prevention

  • Enable every lock available—registrar lock minimum, registry lock for valuable domains
  • Use hardware 2FA for critical domains—YubiKey prevents remote attacks
  • Monitor proactively—catch unauthorized changes before transfer completes
  • Keep detailed records—proof of ownership is critical for recovery
  • Use password manager religiously—eliminates password reuse and weak passwords
  • Review security monthly—regular audits catch issues before exploitation
  • Plan for worst case—have incident response plan before you need it

Communication

  • Be clear and specific when reporting to registrars
  • Provide case numbers in all follow-ups
  • Keep escalation ladder handy (support → supervisor → legal → ICANN)
  • Document all interactions with dates, names, promises
  • Follow up regularly—squeaky wheel gets attention
  • Use public pressure judiciously—social media can help but can backfire

Frequently Asked Questions

How quickly can I recover a hijacked domain?

Recovery time varies widely: 1 week if registrars cooperate immediately, 2-3 months through TDRP process, 6+ months if UDRP or legal action is required. The single biggest factor is how quickly you act after discovering the hijacking—report within hours for best chance.

Should I pay a ransom if the hijacker demands money?

No. Paying ransom: 1) encourages future attacks on you and others, 2) doesn't guarantee return of domain, 3) funds criminal activity, 4) may violate laws, and 5) shows weakness. Instead, pursue official recovery through registrars, ICANN disputes, and law enforcement.

What if my registrar won't help me?

Escalate systematically: request supervisor, demand escalation to security team, reference ICANN Transfer Policy obligations, file ICANN complaint (https://www.icann.org/resources/pages/registrar-complaint-2013-04-29-en), use social media to apply public pressure, and ultimately file TDRP complaint. Registrars face penalties for non-compliance with ICANN policies.

Can I sue the registrar for letting my domain be stolen?

Possibly, but challenging. Most registrar terms of service limit liability significantly. You'd need to prove: registrar's negligence (violated their own policies), registrar breach (failed ICANN obligations), causation (their failure directly enabled hijacking), and damages. Consult attorney for high-value cases. Prevention is far better than litigation.

What proof of ownership is most important for recovery?

The strongest proof includes: original domain registration confirmation email with timestamps, credit card/payment statements showing domain charges over time, historical WHOIS records showing your contact information, and account creation records at registrar. Digital communication trail (emails, tickets) is more convincing than after-the-fact declarations.

How can I tell if my domain is about to be hijacked?

Warning signs include: unexpected password reset emails, notifications of contact information changes you didn't make, login alerts from unfamiliar locations, domain lock being disabled without your action, authorization code (EPP) requests you didn't initiate, and transfer notification emails. Monitor WHOIS data for changes—DomainDetails Pro alerts you immediately to any suspicious changes.

Will my website stay online during recovery?

Maybe. If hijacker only transferred domain but hasn't changed nameservers yet, your website may still work temporarily. Once they change DNS settings, your website will go offline. Email will stop working when MX records change. Recovery time determines total downtime—act fast to minimize business disruption.

Can hijackers be prosecuted criminally?

Yes, domain hijacking violates multiple laws: Computer Fraud and Abuse Act (CFAA), wire fraud statutes, identity theft laws, and extortion laws (if ransom demanded). However, prosecution is rare because: 1) hijackers often operate internationally, 2) law enforcement prioritizes cases by dollar amount, 3) victim must file detailed complaint, and 4) jurisdictional complexity. File report anyway for documentation.

What if the domain was hijacked years ago?

Recovery becomes much harder with time: evidence disappears, statute of limitations may apply, domain may have changed hands multiple times, good-faith purchasers have ownership claims, and registrars are less cooperative. However, if you have trademark rights, UDRP has no strict time limit—though "laches" (unreasonable delay) can hurt your case. Consult attorney for old hijackings.

Should I hire a lawyer or do this myself?

For domains worth less than $10,000: Try TDRP yourself—process is designed for non-lawyers, free or low cost, and documentation is straightforward. For domains worth $10,000-$50,000: Consider attorney for UDRP filing—improves success odds, costs $2,000-$5,000 in legal fees. For domains worth $50,000+: Definitely hire experienced domain attorney—complex cases need professional help, stakes justify cost, and attorney experience significantly impacts outcome.

Key Takeaways

  • Time is your enemy—report hijacking within hours for best recovery odds; days matter more than you think

  • Contact both registrars immediately—your losing registrar AND the gaining registrar both have obligations under ICANN policy

  • Document everything in real-time—timeline, WHOIS records, screenshots, emails, communications create your recovery case

  • TDRP is free and fast—Transfer Dispute Resolution Policy specifically addresses unauthorized transfers; use it before expensive UDRP

  • Proof of ownership is critical—keep registration emails, payment records, and historical documentation forever

  • Don't pay ransom ever—encourages repeat attacks and doesn't guarantee return; pursue official channels instead

  • Registrars must cooperate—ICANN policies require investigation and good-faith efforts; escalate aggressively if they refuse

  • Prevention is 100x easier than recovery—enable every lock, use 2FA, monitor changes, and keep detailed records

  • Legal action is last resort—only for high-value domains where TDRP/UDRP failed; costs often exceed $50,000

  • Monitor domains proactively—catching unauthorized changes BEFORE transfer completes makes recovery much easier

Next Steps

If Your Domain Is Currently Hijacked

  1. Stop reading and contact registrars NOW (within the next hour)
  2. Document the hijacking while following registrar recovery process
  3. Secure all related accounts to prevent additional compromises
  4. File TDRP complaint if registrars don't cooperate within 7-10 days

After Recovery

Prevent Future Incidents

Research Sources

This article was researched using authoritative sources: