Would you treat this subdomain takeover path as critical exposure?
Trying to sanity-check the below.
Say an org has an old subdomain with a CNAME pointing to a cloud resource that no longer exists. Pretty standard dangling DNS issue.
Attacker claims the abandoned cloud alias, gets a valid cert for the real subdomain, and hosts a tiny remote resource there.
Now a targeted employee opens an email that loads that resource from the hijacked subdomain. If cookies are scoped broadly to the parent domain, the browser/mail client may send session cookies automatically to the attacker-controlled subdomain.
So the path is basically:
dangling CNAME → claimed cloud alias → valid cert on real subdomain → remote resource loads → parent-domain cookies leak → possible access to internal apps like HR, finance, CRM, support/admin consoles
My question: would you treat this as a critical pre-attack exposure, or just attack-surface hygiene until there is evidence of abuse?
Also curious who usually owns this in your org.