When a domain is compromised, every second counts. Whether through phishing, DNS hijacking, or unauthorized registrar access, attackers leave digital traces that fade quickly. Logs are overwritten, DNS changes propagate, and SSL certificates are renewed automatically. Without prompt and structured evidence preservation, the trail can vanish before investigators or registrars can intervene.
This guide explains how to collect, secure, and preserve forensic evidence after a domain-related incident. It draws on registrar-level best practices, ICANN compliance standards, and incident response procedures that help domain owners build defensible records of what happened, when, and how.
Understanding Domain-Level Threats
Domains are prime digital assets, and attackers know it. Hijackers target login credentials, API tokens, or DNS providers to redirect traffic, capture credentials, or damage brand trust. Phishing operators register look-alike domains to impersonate legitimate businesses. In both cases, the common denominator is the exploitation of the DNS and registrar ecosystem.
The most frequent domain-level threats include:
- Registrar account compromise: Stolen credentials allow attackers to modify WHOIS data, name servers, or DNS records.
- DNS hijacking: Attackers redirect traffic to malicious IPs through unauthorized record changes.
- Phishing impersonation: Fraudulent domains are registered to mimic legitimate brands or services.
- Unauthorized SSL issuance: Fake certificates are created to make spoofed sites appear legitimate.
The key to mitigating these threats lies in preserving what the attackers leave behind. DNS records, SSL transparency logs, and registrar activity timestamps can all serve as critical forensic evidence.
The Forensic Value of Domain Metadata
Every interaction with a domain generates metadata: registrar logs, DNS lookups, SSL requests, and RDAP responses. This metadata is gold for investigators. It reveals not just what happened but also when and where it occurred.
Key sources of domain-level forensic data include:
- Registrar logs: Documented timestamps of account changes, IP logins, and support communications.
- WHOIS or RDAP data: Confirms domain ownership, contact changes, and privacy redactions.
- Certificate Transparency (CT) logs: Record every SSL certificate ever issued, legitimate or otherwise.
- Email headers: Expose message routes, spoofing patterns, and relay servers.
- Web server and DNS logs: Capture IP activity and unauthorized configuration edits.
Step One: Secure and Snapshot the Environment
Before collecting evidence, stop further damage. Immediately lock the affected domain at the registrar, enable two-factor authentication, and verify account recovery emails. Once secured, begin the evidence capture process.
Create snapshots of the current configuration:
- Export your DNS zone file from the registrar or hosting platform.
- Capture screenshots of DNS, MX, SPF, and DMARC records.
- Record current name server values and TTLs.
- Save a local copy of WHOIS or RDAP output showing the current registrant and status.
- Note the IPs associated with your website and mail servers.
If your DNS is managed through Cloudflare, AWS Route 53, or another third-party provider, export the activity logs before making any changes. These logs often show which API key or user initiated modifications.
Step Two: Collect Registrar Evidence
Registrar data forms the foundation of your ownership claim. Most registrars maintain complete records of account access, domain status changes, and support interactions. This data is essential for reconstructing timelines.
- Registrar login notifications and domain transfer approval emails.
- WHOIS and RDAP snapshots with timestamps.
- Support ticket IDs, response logs, and related attachments.
- Account access history showing login IP addresses and time of access.
Capture data directly from your registrar portal and email inbox. Do not rely on cached browser data, as it can be altered or lost.
Preserve privacy-protection settings as well. If WHOIS redaction was active, note the masking service and the registrar privacy flag. Such details confirm legitimate protection and prevent false allegations of concealment.
Step Three: Preserve DNS and Network Logs
DNS logs tell the story of how and when an attack unfolded. Retrieve them as soon as possible, since many providers purge activity data within days.
- Export DNS query and change history.
- Save IP address logs showing which hosts modified records.
- Capture CDN or proxy logs if services like Cloudflare or Akamai were used.
- Retrieve web server logs (Apache, Nginx) showing suspicious POST or GET activity.
Seal exported files with hash verification. Compute and store SHA-256 or SHA-512 hashes for each file. Record these in a manifest file so their integrity can be verified later. Keep copies in an encrypted archive or write-protected drive.
Step Four: Identify Unauthorized SSL Certificates
Attackers often issue new SSL certificates to make phishing pages appear authentic. Certificate Transparency (CT) logs track these events in public ledgers.
Visit tools like crt.sh or use APIs from Let’s Encrypt or Google CT to check for newly issued certificates referencing your domain. Any unknown certificate fingerprints should be immediately flagged for revocation.
Maintain a record of all SSL certificates:
- Common Name (CN) and Subject Alternative Names (SANs).
- Serial numbers and issuing Certificate Authorities (CAs).
- Validity periods and SHA-1 or SHA-256 fingerprints.
Save PEM or DER copies of suspicious certificates as evidence, along with screenshots of their CT log entries. These materials are crucial for legal or registrar escalation.
Step Five: Gather Email Evidence
If the incident involves phishing or spoofed emails, collecting message headers is vital. Email headers reveal the origin IP, relay servers, and authentication failures.
- Full email headers from affected messages.
- SPF, DKIM, and DMARC results.
- Email metadata such as Message-ID and Received headers.
Save each message in .eml format to preserve MIME integrity. Use an email header analyzer to extract key indicators, such as domain misalignment or unauthorized sending domains.
Step Six: Capture Web Artifacts and Redirect Chains
When phishing or defacement is active, document it immediately. Avoid interacting with the malicious site directly; instead, use a sandbox or an isolated virtual environment.
- Full-page screenshots showing the spoofed site layout.
- Redirect chains using curl -I -L or browser developer tools.
- Hosting IP address and ASN information.
- HTTP headers, including Location, Server, and Set-Cookie values.
Save HTML source files locally using wget or httrack. These files show embedded scripts or injected payloads. Keep a read-only copy in a secured evidence folder.
Step Seven: Document Chain of Custody
Evidence is only useful if its integrity can be proven. The chain of custody documents who collected the evidence, when, and how.
Create a forensic logbook containing:
- Evidence description (file name, source, and context).
- Collector’s name and timestamp.
- SHA-256 hash for verification.
- Storage location and access permissions.
Use read-only archives or encrypted external drives for storage. If cloud storage is necessary, configure write-once permissions. Every handover, even internal, should be signed or digitally timestamped.
Step Eight: Reporting and Registrar Coordination
Once evidence is gathered, escalate it to your registrar or domain provider. Include structured documentation: incident summary, timeline, and proof of ownership.
- Domain name(s) and affected subdomains.
- Timestamps for suspicious events.
- Screenshots and log snippets showing anomalies.
- Hash manifest of collected evidence.
Step Nine: When Legal or Law Enforcement Action Is Needed
In severe cases of hijacking or identity theft, legal escalation becomes necessary. Work with counsel experienced in cyber law to determine jurisdiction and evidentiary requirements.
Keep all logs, emails, and communications in original format. Do not edit file names or timestamps. Provide law enforcement with:
- Registrar correspondence and support logs.
- WHOIS or RDAP snapshots before and after compromise.
- Server and CT logs confirming unauthorized access.
Preserving the chain of custody and metadata authenticity ensures admissibility in court or arbitration.
Prevention: Turning Lessons into Policy
The best defense against future compromise is a proactive evidence-readiness policy. Establishing procedures for snapshotting, logging, and access control can drastically reduce recovery time.
- Enable registrar lock and DNSSEC for all primary domains.
- Use strong, unique passwords and enforce two-factor authentication for registrar and DNS accounts.
- Monitor Certificate Transparency logs for your domain.
- Schedule quarterly DNS and RDAP audits.
- Maintain a local record of domain assets and renewal timelines.
Preparedness Is the Best Defense
Domain evidence preservation is not an afterthought; it is a core part of cyber resilience. The ability to document every change, capture every log, and prove every claim separates recoverable incidents from unrecoverable losses.
Every organization should maintain a clear playbook for digital forensics, backed by registrar support and internal readiness. The faster evidence is captured, the higher the success rate for mitigation and restoration.
Start with NameSilo’s integrated tools: DNS management and SSL monitoring. Build them into your incident response strategy and make evidence readiness a permanent layer of domain security.