Quick Answer
If your domain has been hijacked, act immediately. Contact your registrar's abuse/security team within hours (not days) and request they lock the domain. Simultaneously contact the gaining registrar if transferred. Document everything: WHOIS history, screenshots, timeline, proof of ownership. File complaints through ICANN's Transfer Dispute Resolution Policy (TDRP) for unauthorized transfers, or UDRP for trademark violations. Change all account passwords and enable 2FA. Most recoveries succeed when action is taken within 24-48 hours—delays significantly reduce recovery chances.
Table of Contents
- Understanding Domain Hijacking
- Immediate Actions: First 24 Hours
- Contacting Your Registrar
- Contacting the Gaining Registrar
- Documenting the Hijacking
- Filing a TDRP Complaint
- Filing a UDRP Complaint
- Legal Action Options
- Working with Law Enforcement
- Securing Your Accounts
- Recovery Timeline Expectations
- When Recovery Is Not Possible
- Preventing Future Hijacking
- Best Practices
- Frequently Asked Questions
- Key Takeaways
- Next Steps
Understanding Domain Hijacking
Domain hijacking (also called domain theft) occurs when someone gains unauthorized control of your domain name and transfers it away from your account or registrar without your permission.
How Hijacking Occurs
Common attack vectors:
-
Compromised registrar account
- Stolen password (phishing, data breach, keylogger)
- Weak security (no 2FA, reused passwords)
- Social engineering of registrar support
-
Compromised email account
- Password reset links intercepted
- Transfer confirmation emails approved
- Account change notifications deleted
-
Registrar security failures
- Support staff fooled by social engineering
- Inadequate identity verification
- Insider threats
-
Social engineering
- Impersonation of domain owner
- Fake identity documents
- Manipulation of support personnel
Signs Your Domain Was Hijacked
| Symptom | What It Means |
|---|---|
| Website suddenly offline | DNS changed or domain suspended |
| Email stops working | MX records changed or domain transferred |
| Unexpected transfer email | Domain moved to another registrar |
| Can't log into registrar | Password changed or account compromised |
| WHOIS shows different registrar | Transfer already completed |
| WHOIS shows different contact info | Registration data changed |
| Unknown nameservers in WHOIS | DNS control transferred |
| clientTransferProhibited removed | Lock disabled (precursor to transfer) |
Why Time is Critical
Hours matter:
- First 5 days: Transfer can be rejected by gaining registrar
- First 24 hours: Easiest window for registrar intervention
- After transfer completes: Significantly harder to reverse
- After multiple transfers: Much harder to trace and reverse
- After 60+ days: Statute of limitations issues may arise
The sooner you act, the more likely you are to recover your domain intact.
Immediate Actions: First 24 Hours
When you discover your domain has been hijacked, follow these steps immediately—preferably within the first hour.
Step 1: Verify the Hijacking
Before panicking, confirm hijacking actually occurred:
-
Check WHOIS data
- Run WHOIS lookup on your domain
- Verify registrar hasn't changed
- Check contact information is still yours
- Note nameserver changes
-
Try logging into your account
- Attempt login at your registrar
- Try password reset
- Check if email address was changed
-
Check your email
- Search for transfer notifications
- Look for password reset emails you didn't request
- Check spam/trash folders
- Review sent folder for sent emails you didn't send
If WHOIS shows a different registrar or contact info: You've been hijacked.
Step 2: Contact Your Original Registrar
Call, don't email—this is urgent:
-
Find abuse/security contact:
- GoDaddy: 480-505-8877 (abuse line)
- Namecheap: [email protected] + phone support
- Google Domains/Squarespace: Submit abuse ticket immediately
- Cloudflare: [email protected] + dashboard ticket
- Porkbun: [email protected] (support ticket with URGENT)
-
Explain the situation clearly:
- "My domain [name] was stolen without authorization"
- "I did not initiate this transfer"
- "This is an unauthorized account access"
- Request immediate domain lock
-
Request specific actions:
- Lock the domain immediately
- Reverse any recent changes
- Investigate how access was gained
- Provide case/ticket number for documentation
-
Document the interaction:
- Note case number
- Record agent name and time
- Save email confirmations
- Screenshot all communications
Step 3: Contact the Gaining Registrar
If your domain was transferred to another registrar:
-
Identify the new registrar (via WHOIS lookup)
-
Contact their abuse department immediately:
- Report the domain as stolen
- Request they lock the domain
- Ask them to investigate the transfer
- Provide proof of ownership
-
Common abuse contacts:
- GoDaddy: [email protected]
- Namecheap: [email protected]
- Tucows/OpenSRS: [email protected]
- Dynadot: [email protected]
-
Be professional but firm:
- Clearly state the domain was stolen
- Provide timeline of events
- Request reversal of transfer
- Mention ICANN TDRP if needed
Step 4: Secure All Related Accounts
Immediately change passwords for:
- Your registrar account
- Email associated with domain
- Other domains at same registrar
- Hosting accounts
- Payment methods
Enable 2FA on:
- Registrar accounts (all of them)
- Email accounts
- Password manager
- Any account with sensitive access
Check for:
- Unknown login sessions
- Unauthorized email forwarding rules
- New recovery emails/phones added
- Recent password changes on other accounts
Contacting Your Registrar
Your original registrar is your first line of defense in recovery.
What to Say
Initial contact template:
Subject: URGENT - Domain Hijacking Report - [YourDomain.com]
I am the legitimate owner of [YourDomain.com] which was hijacked
without my authorization on [Date].
Account Details:
- Domain: [YourDomain.com]
- Account: [Username/Email]
- Registration Date: [Original date]
- Current Status: [Transferred/Locked/Suspended]
Evidence of Ownership:
- Original registration email attached
- Payment records attached
- Account access history shows unauthorized access [Date/Time]
I did NOT:
- Initiate any transfer
- Approve any transfer emails
- Request any account changes
- Change my password on [suspicious date]
I request immediate action:
1. Lock the domain immediately
2. Reverse the unauthorized transfer
3. Investigate the security breach
4. Restore original settings
I am available at [Phone] for verification.
This is a time-sensitive security emergency.
[Your Name]
[Account Verification Details]
Information to Provide
Proof of ownership:
- Original registration confirmation email
- Payment receipts for domain/renewals
- Historical WHOIS records (via DomainTools/WHOIS History)
- Account creation date
- Previous support ticket numbers
- Payment method details (last 4 digits of card)
- Previous IP addresses you logged in from
- Detailed account history
Timeline documentation:
- When you last accessed the account
- When you discovered the hijacking
- When unauthorized changes occurred
- Any suspicious emails received
Registrar Response Expectations
Best case: Registrar immediately locks domain and initiates reversal process.
Common case: Registrar opens investigation, requests verification, provides timeline (3-7 days).
Worst case: Registrar claims they cannot intervene and refers you to ICANN dispute process.
If Your Registrar Won't Help
Escalation steps:
-
Request escalation to supervisor
- Ask for security team lead
- Request case be escalated to legal department
-
Reference ICANN policies
- Transfer Policy requires registrar cooperation
- TDRP provides dispute mechanism
- Registrar agreement mandates security standards
-
File ICANN complaint
- Go to: https://www.icann.org/resources/pages/registrar-complaint-2013-04-29-en
- Select "Transfer Complaint"
- Provide all documentation
- ICANN will investigate and pressure registrar
-
Public pressure (last resort)
- Post to domain forums (NamePros)
- Tweet at registrar (they often respond faster)
- Review sites (TrustPilot, BBB)
- Domain industry press (Domain Name Wire)
Contacting the Gaining Registrar
The registrar who received your domain has obligations to investigate theft reports.
Why They Should Help
ICANN Transfer Policy requires:
- Reasonable investigation of theft claims
- Cooperation with legitimate owners
- Reversal of fraudulent transfers
- Documentation of verification procedures
Most registrars:
- Don't want to harbor stolen domains
- Face compliance risks
- Value their reputation
- Want to avoid legal liability
How to Contact Them
Email the abuse department:
Subject: Stolen Domain Report - [YourDomain.com]
To: Abuse Department
I am reporting that [YourDomain.com] was fraudulently transferred
to your registrar on [Date] without my authorization.
Transfer Details:
- Domain: [YourDomain.com]
- Transfer Date: [Date from WHOIS]
- Losing Registrar: [Previous registrar]
- Current Status: Registered at [Their registrar]
I am the legitimate owner and did NOT authorize this transfer.
Evidence:
- Proof of ownership attached
- Timeline of unauthorized access
- Original registrar's case #[Number]
- WHOIS history showing my ownership
I request:
1. Immediate lock of the domain
2. Investigation of the transfer
3. Reversal to original registrar
4. Contact information of account holder
Under ICANN's Transfer Dispute Resolution Policy (TDRP), I am
entitled to investigation and potential reversal of this
unauthorized transfer.
I am prepared to file formal TDRP complaint if necessary.
[Your Contact Information]
[Supporting Documentation Links]
Follow-Up Actions
If they respond positively:
- Provide requested verification immediately
- Stay in regular communication
- Request timeline for resolution
- Ask for written confirmation of actions taken
If they don't respond within 48 hours:
- Call their support line directly
- Send follow-up email referencing ICANN TDRP
- Copy your original registrar on communication
- Prepare to file formal TDRP complaint
If they refuse to help:
- Document their refusal
- Note the reasons they provided
- Proceed to ICANN TDRP filing
- Consider legal counsel if domain is high-value
Documenting the Hijacking
Thorough documentation is critical for recovery and potential legal action.
What to Document
1. Timeline of Events
Create detailed chronology:
- Last time you successfully accessed the domain/account
- When you first noticed something wrong
- When unauthorized changes occurred (per WHOIS history)
- When you contacted registrars
- All subsequent events
Example format:
2025-11-28 9:00 AM - Last successful login to registrar account
2025-11-29 2:34 PM - Unauthorized password change (per registrar logs)
2025-11-29 2:41 PM - Domain lock removed
2025-11-29 3:15 PM - Transfer initiated to NewRegistrar
2025-11-30 8:00 AM - Discovered website offline
2025-11-30 8:15 AM - Contacted GoDaddy abuse (Case #12345)
2025-11-30 8:30 AM - Contacted NewRegistrar abuse
2. WHOIS Records
Capture historical WHOIS data:
- Current WHOIS (as soon as you discover hijacking)
- Previous WHOIS showing your ownership
- Any intermediate WHOIS data
- WHOIS history from services like:
- DomainTools
- WHOIS History
- SecurityTrails
3. Screenshots
Capture evidence visually:
- Current WHOIS data
- Your registrar account (if accessible)
- Website showing offline/wrong content
- Email confirmations of domain registration
- Payment records
- Transfer notification emails
- Account activity logs
- Support ticket conversations
4. Email Evidence
Save all emails related to:
- Original domain registration
- Renewal confirmations
- Unauthorized transfer notifications
- Password reset attempts you didn't make
- Support communications
- Suspicious phishing emails
5. Proof of Ownership
Gather everything proving you own the domain:
- Registration confirmation email
- Credit card statements showing domain charges
- Renewal receipts
- Historical DNS records you configured
- Website content you created
- Email correspondence sent from the domain
- Business registration showing domain ownership
- Tax records (if business expense)
- Historical backups of website
6. Communication Records
Document all recovery attempts:
- Registrar support tickets (case numbers)
- Phone call logs (date, time, agent name)
- Email threads
- Responses received
- Actions promised
Organizing Documentation
Create a folder structure:
DomainRecovery_YourDomain_2025/
├── Timeline.txt
├── WHOIS/
│ ├── current_whois_2025-11-30.txt
│ ├── historical_whois_2024.txt
│ └── domaintools_history.pdf
├── Screenshots/
│ ├── whois_evidence.png
│ ├── registrar_account.png
│ └── offline_website.png
├── Emails/
│ ├── original_registration.pdf
│ ├── unauthorized_transfer.pdf
│ └── support_communications.pdf
├── Proof_of_Ownership/
│ ├── registration_receipt.pdf
│ ├── credit_card_statements.pdf
│ └── business_registration.pdf
└── Legal/
├── TDRP_filing.pdf
└── attorney_correspondence.pdf
Keep backups:
- Cloud storage (Google Drive, Dropbox)
- Local hard drive
- USB drive
- Print critical documents
This documentation will be essential for ICANN disputes, legal action, and insurance claims.
Filing a TDRP Complaint
ICANN's Transfer Dispute Resolution Policy (TDRP) addresses unauthorized transfers.
What is TDRP?
TDRP (Transfer Dispute Resolution Policy):
- ICANN-mandated dispute process
- Specifically for unauthorized transfers
- Faster than UDRP
- Can result in domain being returned to original registrar
- Free to file (no filing fee)
When to use TDRP:
- Domain transferred without your authorization
- Transfer violated ICANN Transfer Policy
- Registrars won't cooperate in reversal
- Need formal mechanism to force action
TDRP Filing Process
Step 1: Exhaust Registrar Remedies
You must first attempt resolution with:
- Your losing registrar (original)
- The gaining registrar (current)
- Document their responses (or lack of response)
ICANN requires:
- At least 7 days for registrars to respond
- Good faith effort to resolve directly
- Documentation of these attempts
Step 2: File Complaint with Registrar
If registrars don't resolve it, formally file with the gaining registrar:
Components of filing:
- Written complaint describing unauthorized transfer
- Evidence of ownership
- Timeline of events
- Explanation why transfer was unauthorized
- Request for specific remedy (return domain)
Send to:
- Gaining registrar's TDRP contact (find on ICANN registrar list)
- Use certified mail or email with read receipt
- Keep copies of everything
Step 3: Registrar Decision
Gaining registrar must:
- Review your complaint
- Investigate the transfer
- Make determination within reasonable timeframe
- Either reverse transfer or deny complaint
If registrar reverses: Domain returns to original registrar (success!).
If registrar denies: You can escalate to ICANN dispute provider.
Step 4: Escalate to Dispute Provider
If registrar denies your complaint, escalate to ICANN-approved dispute provider:
Providers:
- National Arbitration Forum (NAF)
- Asian Domain Name Dispute Resolution Centre (ADNDRC)
File formal TDRP complaint:
- Use provider's online filing system
- Submit all documentation
- Pay filing fee (if required—varies by provider)
- Wait for provider decision
Step 5: Decision and Appeal
Provider will:
- Review evidence from both sides
- Make determination based on ICANN policy
- Issue binding decision
Possible outcomes:
- Transfer reversed: Domain returned to you (win)
- Transfer upheld: Current registrant keeps domain (loss)
- Partial remedy: Compromise solution
Appeals: Limited appeal rights depending on specific circumstances.
Timeline Expectations
| Phase | Duration |
|---|---|
| Registrar attempts | 7-14 days |
| Formal complaint to registrar | 7-10 days |
| Registrar investigation | 10-20 days |
| Escalation to provider | Immediate |
| Provider review | 30-45 days |
| Decision | Immediate after review |
| Total | 2-3 months |
Cost
TDRP is generally free or low cost:
- No ICANN filing fee for initial complaint
- Registrars handle most cases internally
- Provider fees (if escalated): Varies, typically $100-$500
- Attorney fees: Optional but recommended for high-value domains
Filing a UDRP Complaint
If your domain hijacking involves trademark issues, UDRP may be appropriate.
What is UDRP?
UDRP (Uniform Domain-Name Dispute-Resolution Policy):
- For trademark-related domain disputes
- Addresses cybersquatting and bad-faith registration
- Takes 2-3 months
- Costs $1,500-$4,000
- Can result in domain transfer or cancellation
When to Use UDRP Instead of TDRP
Use UDRP if:
- Domain contains your trademark
- Hijacker is cybersquatting or squatting
- Registration (by hijacker) was in bad faith
- You have registered trademark
- TDRP failed or doesn't apply
Use TDRP if:
- Issue is purely unauthorized transfer
- No trademark involved
- You just want domain back
UDRP Requirements
To win UDRP, you must prove:
1. Domain is identical or confusingly similar to your trademark
- You have trademark rights (registered or common law)
- Domain name matches trademark
2. Current registrant has no legitimate rights
- They're not using domain legitimately
- No authorization from you
- Not commonly known by that name
3. Domain registered and used in bad faith
- Stolen to sell back to you (ransom)
- Disrupting your business
- Confusing your customers
- Pattern of hijacking domains
UDRP Filing Process
Step 1: Choose Provider
ICANN-approved providers:
- WIPO (World Intellectual Property Organization)
- NAF (National Arbitration Forum)
- ADNDRC (Asian Domain Name Dispute Resolution Centre)
Most popular: WIPO (most cases filed here)
Step 2: Prepare Complaint
Required elements:
- Your contact information
- Domain name in dispute
- Registrar information
- Grounds for complaint (prove 3 elements above)
- Evidence of trademark rights
- Evidence of bad faith
- Requested remedy (transfer domain to you)
Evidence to include:
- Trademark registration certificates
- Evidence domain was stolen (timeline, WHOIS history)
- Proof you're the legitimate owner
- Evidence of hijacker's bad faith
- Screenshots, emails, documentation
Step 3: Submit and Pay
Filing online:
- Use provider's filing system (e.g., WIPO eADR)
- Upload all documents
- Pay filing fee
Fees (WIPO 2025):
- Single panelist: $1,500
- Three panelists: $4,000
- Additional fees for multiple domains
Step 4: Respondent Has Opportunity to Respond
After filing:
- Registrar verifies submission is in order
- Respondent (hijacker) notified
- Respondent has 20 days to file response
- They may defend, ignore, or negotiate
Step 5: Panel Review and Decision
Panel process:
- Expert panelist(s) review both sides
- Evaluate evidence against UDRP criteria
- Issue decision
Timeline: 45-60 days from filing
Possible outcomes:
- Complaint granted: Domain transferred to you
- Complaint denied: Current registrant keeps domain
- Complaint withdrawn: You withdraw or settle
Timeline
| Phase | Duration |
|---|---|
| Prepare and file complaint | 1-2 weeks |
| Provider review | 3-5 days |
| Respondent notification | Immediate |
| Respondent response period | 20 days |
| Panel appointment | 3-5 days |
| Panel decision | 14-21 days |
| Total | 2-3 months |
Cost Analysis
UDRP costs:
- Filing fee: $1,500-$4,000
- Attorney fees: $2,000-$10,000+ (optional but recommended)
- Total: $3,500-$14,000+
Worth it if:
- Domain is business-critical
- Domain has high value (>$10,000)
- Trademark infringement is clear
- You have strong evidence
Not worth it if:
- Domain has minimal value
- Trademark case is weak
- Hijacker may return domain cheaper
- TDRP is appropriate alternative
Legal Action Options
For high-value domains or when administrative processes fail, legal action may be necessary.
When to Consider Legal Action
Appropriate if:
- Domain is extremely valuable ($25,000+)
- Business is severely impacted
- TDRP/UDRP failed
- Criminal activity is evident
- Damages are substantial
- You have solid evidence
Not recommended if:
- Domain has low value
- Evidence is weak
- Legal costs exceed domain value
- Faster alternatives exist
Types of Legal Action
1. Civil Lawsuit
Claims you can make:
- Theft/conversion of property
- Trademark infringement (if applicable)
- Cybersquatting (ACPA - Anticybersquatting Consumer Protection Act)
- Breach of contract (if registrar violated terms)
- Fraud
- Tortious interference with business
Potential remedies:
- Transfer of domain to you
- Monetary damages
- Attorney's fees (in some cases)
- Injunctive relief
Where to file:
- Federal court (for ACPA, trademark claims)
- State court (for theft, fraud claims)
- Jurisdiction: Where you are, where defendant is, or where registrar is
Cost: $10,000-$100,000+ in legal fees
Timeline: 1-3 years
2. Anticybersquatting Consumer Protection Act (ACPA)
Federal law (USA only):
- Addresses cybersquatting and domain hijacking
- Requires bad faith registration or use
- Requires trademark rights
- Statutory damages up to $100,000 per domain
- Attorney's fees possible
Advantages over UDRP:
- Monetary damages possible
- More discovery available
- Court order is enforceable
- Can sue multiple parties
Requirements:
- You have trademark rights
- Domain is identical or confusingly similar
- Bad faith intent by hijacker
3. Criminal Charges
Domain hijacking may constitute:
- Computer Fraud and Abuse Act (CFAA) violation
- Identity theft
- Wire fraud
- Extortion (if ransom demanded)
How to pursue:
- File report with local police
- Report to FBI (IC3.gov)
- Report to Secret Service (if commercial)
- Provide all evidence
Challenges:
- Law enforcement may not prioritize
- Jurisdictional issues
- International hijackers hard to prosecute
- Long timelines
Better for:
- Deterrence
- Evidence gathering
- Parallel to civil action
- High-profile cases
Finding an Attorney
Look for:
- Intellectual property attorneys
- Internet law specialists
- Domain name dispute experience
- UDRP/ACPA experience
- Good track record
Where to find:
- State bar association referrals
- Martindale-Hubbell directory
- Internet law directories
- Domain investor forums recommendations
- WIPO panelist directories (attorneys who handle cases)
Questions to ask:
- How many domain cases have you handled?
- What's your success rate?
- What's your fee structure?
- What's the realistic timeline?
- What are my chances of success?
- What will total costs be?
Cost-Benefit Analysis
Calculate:
- Legal fees: $10,000-$100,000+
- Filing fees: $400-$1,000
- Expert witness fees: $5,000-$20,000
- Discovery costs: $5,000-$30,000
- Time investment: Substantial
Compare to:
- Domain's actual value
- Domain's value to your business
- Cost of rebranding
- Likelihood of success
- Alternative dispute costs (UDRP ~$4,000)
General rule: Only pursue legal action if domain value and business impact exceed $50,000.
Working with Law Enforcement
For criminal aspects of domain hijacking, law enforcement involvement may help.
When to Involve Police
Contact law enforcement if:
- Clear evidence of criminal hacking
- Identity theft occurred
- Financial fraud involved
- Ransom or extortion attempted
- Part of larger criminal enterprise
- Hijacker's identity is known
How to Report
1. Local Police
Report to your local police department:
- File a report in person
- Bring all documentation
- Explain the crime clearly (use analogies: "like stealing my car")
- Get case number
Challenges:
- May not understand technical details
- May not prioritize (not physical crime)
- Limited jurisdiction
- Unlikely to investigate actively
Still worth it for:
- Official crime report (documentation)
- Insurance claims
- Supporting civil case
- If hijacker is local
2. FBI (United States)
Internet Crime Complaint Center (IC3):
- Website: www.ic3.gov
- Online reporting system
- FBI-run complaint center
- Free to file
Information to provide:
- Detailed timeline
- Financial loss amount
- Technical details
- Suspect information (if known)
- Evidence of crime
Realistic expectations:
- FBI investigates cases meeting thresholds:
- High dollar amounts ($100,000+)
- Multiple victims (patterns)
- National security implications
- Individual domain theft unlikely to trigger investigation
- Report still creates official record
3. Secret Service (United States)
U.S. Secret Service investigates:
- Commercial cybercrime
- High-value fraud cases
- Identity theft rings
- Financial crimes
Contact:
- Local Secret Service field office
- Electronic Crimes Task Force
- Provide detailed evidence
More likely to investigate if:
- Commercial/business domain
- Substantial financial impact
- Part of larger criminal scheme
- Business disruption is severe
4. International Agencies
For international hijackers:
- Interpol: International coordination
- Europol: European crimes
- Country-specific cybercrime units: Many countries have dedicated teams
Challenges:
- Jurisdictional complexity
- Lack of cooperation
- Different laws
- Language barriers
What Law Enforcement Can Do
If they investigate:
- Subpoena records from registrars/ISPs
- Trace IP addresses and logins
- Identify suspects
- Coordinate with international partners
- Seize domains (in some cases)
- File criminal charges
Realistic outcomes:
- Official crime report (useful for insurance, lawsuits)
- Possible investigation (if high profile or part of pattern)
- Recovery unlikely through criminal process alone
- Deterrent effect if hijacker is prosecuted
Using Criminal Reports in Civil Cases
Police reports are useful for:
- Documenting the crime officially
- Supporting civil lawsuits
- Insurance claims
- ICANN dispute processes
- Demonstrating seriousness
Include in:
- UDRP/TDRP filings
- Civil complaint exhibits
- Communications with registrars
- Settlement negotiations
Securing Your Accounts
After hijacking, secure ALL accounts to prevent repeat attacks.
Immediate Security Steps
1. Change All Passwords
Update passwords for:
- All domain registrar accounts
- Email accounts (especially domain admin email)
- Hosting accounts
- DNS management accounts
- Website admin panels
- Payment processors
- Any account related to the domain
Password requirements:
- Minimum 20 characters
- Unique for every account
- Use password manager to generate and store
- Never reuse passwords
2. Enable Two-Factor Authentication
Enable 2FA on:
- Every registrar account
- Email accounts
- Password manager
- Hosting accounts
- Any account with domain access
Use authenticator apps (not SMS):
- Authy
- Google Authenticator
- Microsoft Authenticator
- 1Password (built-in)
Why not SMS: SIM swapping attacks can intercept SMS codes.
3. Review Account Access
Check for unauthorized access:
- Review login history at all registrars
- Check active sessions
- Look for unfamiliar IP addresses
- Terminate all active sessions
- Review account changes (email, phone, contacts)
4. Check Email Security
Secure your email account:
- Remove forwarding rules
- Check for unknown recovery emails/phones
- Review connected apps/devices
- Check sent folder for sent emails you didn't send
- Enable login alerts
5. Review Payment Methods
Update payment security:
- Check for unauthorized charges
- Update credit card if compromised
- Remove old payment methods
- Enable transaction alerts
- Consider virtual card numbers for registrar payments
Ongoing Security Practices
Monthly tasks:
- Review account login history
- Verify domain locks are enabled
- Check WHOIS data hasn't changed
- Audit active sessions
- Review connected devices/apps
Quarterly tasks:
- Change critical passwords
- Review security settings
- Update recovery information
- Test 2FA backup codes
- Audit all domain accounts
Annual tasks:
- Full security audit
- Review registrar security features
- Consider upgrading to registry lock (high-value domains)
- Document all domains and credentials
- Update emergency contact procedures
Recovery Timeline Expectations
Understanding realistic timelines helps set expectations.
Best Case Scenario
If you act immediately and registrars cooperate:
| Timeframe | Action |
|---|---|
| Hour 1 | Discover hijacking, contact registrars |
| Hours 2-4 | Registrars lock domain |
| Day 1 | Investigation begins |
| Days 2-3 | Ownership verified |
| Days 3-5 | Transfer reversed |
| Day 7 | Domain fully restored |
| Total: 1 week | Complete recovery |
Requirements:
- Immediate action (within hours)
- Clear proof of ownership
- Cooperative registrars
- Transfer not yet completed
- No complications
Typical Scenario
With registrar cooperation and TDRP:
| Timeframe | Action |
|---|---|
| Day 1 | Discovery and initial contact |
| Days 2-7 | Registrar attempts at resolution |
| Days 8-14 | Formal TDRP complaint filed |
| Days 15-30 | Registrar investigation |
| Days 31-45 | Escalation to ICANN provider (if needed) |
| Days 46-90 | Provider review and decision |
| Days 91-100 | Transfer reversed |
| Total: 2-3 months | Complete recovery |
Requirements:
- Action within days
- Proof of ownership available
- One or both registrars need persuading
- May need ICANN escalation
Worst Case Scenario
If UDRP or legal action is required:
| Timeframe | Action |
|---|---|
| Month 1 | TDRP attempts fail |
| Month 2 | Prepare UDRP/legal case |
| Month 3 | File UDRP complaint |
| Months 4-5 | UDRP process |
| Month 6 | UDRP decision (if won) |
| Alternative: Months 6-36 | Civil litigation |
| UDRP: 6 months | Complete recovery |
| Litigation: 1-3 years | Complete recovery |
Complications:
- Multiple transfers
- International jurisdictions
- Uncooperative registrars
- Weak evidence
- Sophisticated hijacker
- Legal challenges
When Recovery Fails
Sometimes domains are not recoverable:
- Hijacker operates from non-cooperative country
- Evidence is insufficient
- Domain has been sold to good-faith third party
- Too much time has passed
- Legal costs exceed domain value
- Registrars refuse to cooperate
In these cases:
- Consider negotiating purchase from current holder
- Rebrand to new domain
- Focus on preventing future incidents
- Pursue damages rather than domain recovery
When Recovery Is Not Possible
Some domains cannot be recovered—know when to move on.
Unrecoverable Situations
1. Sold to Good-Faith Third Party
If hijacker sold domain to innocent buyer:
- Third party has legitimate ownership claim
- They paid fair value
- They had no knowledge of theft
- Courts often protect good-faith purchasers
Your options:
- Pursue hijacker for damages (if identifiable)
- Negotiate purchase from current owner
- Focus on other remedies
2. Jurisdictional Obstacles
If hijacker and domain are in country with:
- No domain law enforcement
- Corrupt legal system
- No international cooperation
- No ICANN oversight mechanisms
Your options:
- Extremely limited
- Likely must rebrand
- Focus on prevention for other domains
3. Insufficient Evidence
If you cannot prove:
- Your ownership
- Unauthorized nature of transfer
- Timeline of events
- Identity of hijacker
Why this happens:
- No documentation kept
- Email accounts deleted
- Old registration records lost
- No WHOIS history available
Lesson: Document everything immediately.
4. Cost Exceeds Value
If domain value < recovery costs:
- UDRP: ~$4,000-$15,000
- Litigation: $50,000-$200,000
- Time investment: Substantial
Calculate:
- Domain replacement cost
- Rebranding cost
- Recovery costs and likelihood
- Make rational decision
5. Too Much Time Has Passed
Statute of limitations varies:
- UDRP: No hard time limit, but staleness matters
- TDRP: Should file within months
- Civil suits: 1-6 years depending on jurisdiction
- Criminal: Varies widely
Delays hurt because:
- Evidence disappears
- Witnesses forget
- Registrars are less cooperative
- Domains change hands multiple times
Making the Decision
Ask yourself:
- What are realistic recovery odds? (<30% means unlikely)
- What will recovery cost in money and time?
- What's the domain actually worth?
- What's rebranding cost?
- Is this about principle or practical value?
If recovery costs exceed 2x domain value: Consider moving on.
Alternatives to Recovery
Option 1: Negotiate Purchase
- Contact current holder
- Offer to buy domain
- Use escrow service
- May be cheaper than legal battle
Option 2: Rebrand
- Choose new domain name
- Redirect old domain if possible
- Update all marketing materials
- Announce rebrand publicly
- Turn it into marketing opportunity
Option 3: Pursue Damages Instead
- Sue hijacker for monetary damages
- Seek compensation, not domain return
- May be more achievable
- Document all losses
Option 4: Focus on Prevention
- Secure all other domains
- Implement comprehensive security
- Learn from experience
- Help others avoid same fate
Lessons from Loss
Every hijacking teaches:
- Security weaknesses in your systems
- Importance of documentation
- Value of proactive monitoring
- Need for insurance/redundancy
- Incident response planning
Use the experience to:
- Improve security across all assets
- Create better backup plans
- Document everything properly
- Help others avoid same mistakes
- Build better processes
Preventing Future Hijacking
Once recovered, prevent repeat incidents.
Essential Security Measures
1. Enable All Domain Locks
-
Registrar Lock (clientTransferProhibited)
- Prevents transfers between registrars
- Enable at your registrar dashboard
- Free and immediate
-
Registry Lock (serverTransferProhibited)
- Higher-level lock at registry
- Requires manual process to unlock
- Usually $25-$100/year per domain
- Essential for high-value domains
-
DNSSEC
- Protects DNS from hijacking
- Adds cryptographic signatures
- Enable at registrar or DNS host
2. Implement Strong Authentication
- Use unique 20+ character passwords for each account
- Enable 2FA with authenticator app (not SMS)
- Save 2FA backup codes securely
- Use hardware security keys for critical accounts (YubiKey)
- Never reuse passwords across accounts
3. Secure Your Email
- Enable 2FA on email account
- Use email provider with strong security (Gmail, ProtonMail)
- Add recovery email and phone
- Enable login alerts
- Review connected apps regularly
- Add PIN to mobile carrier account (prevent SIM swapping)
4. Monitor Your Domains
- Set up WHOIS monitoring alerts
- Monitor DNS/nameserver changes
- Monitor domain status codes
- Check WHOIS data monthly
- Use monitoring service (DomainDetails Pro, DomainTools)
5. Use Security-Focused Registrar
Consider transferring to registrars with strong security:
- Cloudflare Registrar: Security-first design
- Namecheap: Good security features
- MarkMonitor: Enterprise-grade security
- CSC: Corporate domain protection
Look for:
- Mandatory 2FA
- Registry lock option
- Activity logs
- Login notifications
- Dedicated security team
- Good reputation
6. Separate Critical Assets
- Use different registrars for different domain portfolios
- Don't keep all domains in one account
- Use separate email addresses for domain accounts
- Segregate personal and business domains
- Limit who has access to accounts
7. Document Everything
- Keep records of all domain registrations
- Save all confirmation emails
- Document payment history
- Store WHOIS history
- Keep screenshots of domain settings
- Backup website and email data
- Store documentation securely offsite
Business-Specific Protections
For companies:
- Implement role-based access control
- Require two-person approval for transfers
- Conduct quarterly domain audits
- Have incident response plan
- Train employees on social engineering
- Use enterprise registrar services
- Consider domain insurance
- Maintain offline backups of all credentials
Insurance Options
Cyber insurance may cover:
- Domain theft and recovery costs
- Business interruption losses
- Legal fees
- Ransom payments (controversial)
- Reputation recovery costs
Check your policy for:
- Domain theft coverage
- Recovery cost limits
- Deductibles
- Exclusions
Best Practices
If Hijacking Occurs
- Act within hours, not days—every hour matters for recovery odds
- Call registrars immediately—phone calls get faster response than email
- Document everything in real-time—timeline, screenshots, communications
- Secure all related accounts immediately—assume everything is compromised
- Don't pay ransom—encourages repeat attacks and may not work
- Stay persistent—recovery often requires multiple escalations
- Be professional but firm—emotion doesn't help, facts do
For Prevention
- Enable every lock available—registrar lock minimum, registry lock for valuable domains
- Use hardware 2FA for critical domains—YubiKey prevents remote attacks
- Monitor proactively—catch unauthorized changes before transfer completes
- Keep detailed records—proof of ownership is critical for recovery
- Use password manager religiously—eliminates password reuse and weak passwords
- Review security monthly—regular audits catch issues before exploitation
- Plan for worst case—have incident response plan before you need it
Communication
- Be clear and specific when reporting to registrars
- Provide case numbers in all follow-ups
- Keep escalation ladder handy (support → supervisor → legal → ICANN)
- Document all interactions with dates, names, promises
- Follow up regularly—squeaky wheel gets attention
- Use public pressure judiciously—social media can help but can backfire
Frequently Asked Questions
How quickly can I recover a hijacked domain?
Recovery time varies widely: 1 week if registrars cooperate immediately, 2-3 months through TDRP process, 6+ months if UDRP or legal action is required. The single biggest factor is how quickly you act after discovering the hijacking—report within hours for best chance.
Should I pay a ransom if the hijacker demands money?
No. Paying ransom: 1) encourages future attacks on you and others, 2) doesn't guarantee return of domain, 3) funds criminal activity, 4) may violate laws, and 5) shows weakness. Instead, pursue official recovery through registrars, ICANN disputes, and law enforcement.
What if my registrar won't help me?
Escalate systematically: request supervisor, demand escalation to security team, reference ICANN Transfer Policy obligations, file ICANN complaint (https://www.icann.org/resources/pages/registrar-complaint-2013-04-29-en), use social media to apply public pressure, and ultimately file TDRP complaint. Registrars face penalties for non-compliance with ICANN policies.
Can I sue the registrar for letting my domain be stolen?
Possibly, but challenging. Most registrar terms of service limit liability significantly. You'd need to prove: registrar's negligence (violated their own policies), registrar breach (failed ICANN obligations), causation (their failure directly enabled hijacking), and damages. Consult attorney for high-value cases. Prevention is far better than litigation.
What proof of ownership is most important for recovery?
The strongest proof includes: original domain registration confirmation email with timestamps, credit card/payment statements showing domain charges over time, historical WHOIS records showing your contact information, and account creation records at registrar. Digital communication trail (emails, tickets) is more convincing than after-the-fact declarations.
How can I tell if my domain is about to be hijacked?
Warning signs include: unexpected password reset emails, notifications of contact information changes you didn't make, login alerts from unfamiliar locations, domain lock being disabled without your action, authorization code (EPP) requests you didn't initiate, and transfer notification emails. Monitor WHOIS data for changes—DomainDetails Pro alerts you immediately to any suspicious changes.
Will my website stay online during recovery?
Maybe. If hijacker only transferred domain but hasn't changed nameservers yet, your website may still work temporarily. Once they change DNS settings, your website will go offline. Email will stop working when MX records change. Recovery time determines total downtime—act fast to minimize business disruption.
Can hijackers be prosecuted criminally?
Yes, domain hijacking violates multiple laws: Computer Fraud and Abuse Act (CFAA), wire fraud statutes, identity theft laws, and extortion laws (if ransom demanded). However, prosecution is rare because: 1) hijackers often operate internationally, 2) law enforcement prioritizes cases by dollar amount, 3) victim must file detailed complaint, and 4) jurisdictional complexity. File report anyway for documentation.
What if the domain was hijacked years ago?
Recovery becomes much harder with time: evidence disappears, statute of limitations may apply, domain may have changed hands multiple times, good-faith purchasers have ownership claims, and registrars are less cooperative. However, if you have trademark rights, UDRP has no strict time limit—though "laches" (unreasonable delay) can hurt your case. Consult attorney for old hijackings.
Should I hire a lawyer or do this myself?
For domains worth less than $10,000: Try TDRP yourself—process is designed for non-lawyers, free or low cost, and documentation is straightforward. For domains worth $10,000-$50,000: Consider attorney for UDRP filing—improves success odds, costs $2,000-$5,000 in legal fees. For domains worth $50,000+: Definitely hire experienced domain attorney—complex cases need professional help, stakes justify cost, and attorney experience significantly impacts outcome.
Key Takeaways
-
Time is your enemy—report hijacking within hours for best recovery odds; days matter more than you think
-
Contact both registrars immediately—your losing registrar AND the gaining registrar both have obligations under ICANN policy
-
Document everything in real-time—timeline, WHOIS records, screenshots, emails, communications create your recovery case
-
TDRP is free and fast—Transfer Dispute Resolution Policy specifically addresses unauthorized transfers; use it before expensive UDRP
-
Proof of ownership is critical—keep registration emails, payment records, and historical documentation forever
-
Don't pay ransom ever—encourages repeat attacks and doesn't guarantee return; pursue official channels instead
-
Registrars must cooperate—ICANN policies require investigation and good-faith efforts; escalate aggressively if they refuse
-
Prevention is 100x easier than recovery—enable every lock, use 2FA, monitor changes, and keep detailed records
-
Legal action is last resort—only for high-value domains where TDRP/UDRP failed; costs often exceed $50,000
-
Monitor domains proactively—catching unauthorized changes BEFORE transfer completes makes recovery much easier
Next Steps
If Your Domain Is Currently Hijacked
- Stop reading and contact registrars NOW (within the next hour)
- Document the hijacking while following registrar recovery process
- Secure all related accounts to prevent additional compromises
- File TDRP complaint if registrars don't cooperate within 7-10 days
After Recovery
- Domain Theft Prevention: Complete Security Checklist
- Two-Factor Authentication for Domain Accounts
- Understanding Registrar Lock and Transfer Lock
- How to Protect Your Domain from Hijacking
Prevent Future Incidents
Research Sources
This article was researched using authoritative sources: