CyberCX Hack Report: Insights from a year of offensive security testing →

Keys to the (SaaS) kingdom

Threat Advisory

Published by Digital Forensics and Incident Response (DFIR) and Cyber Intelligence on 29 May 2025

Primary author: Tony Mau, DFIR

 

In May 2025, the CyberCX Digital Forensics and Incident Response (DFIR) team was engaged to investigate an incident in which the threat actor performed a domain registration hijacking attack through social engineering to verify themselves as legitimate domain owners to the domain registrar to take control of an organisation’s domain.

During the investigation, the CyberCX DFIR and CyberCX Intelligence teams became aware of a campaign consisting of multiple incidents associated with the same threat actor utilising domain registration hijacking to target financial technology, technology and professional service sectors.

Using this access, the threat actor was able to modify domain name system (DNS) records, including mail exchanger (MX) records, to redirect inbound emails to an attacker-controlled mail server. The threat actor was able to leverage legitimate functionality to verify the compromised domains on various SaaS platforms and attempted to abuse password reset functionality to reset credentials to privileged accounts through redirected emails.

This article focuses on some of the tactics, techniques and procedures (TTPs) that we’ve observed as part of this campaign:

 

Domain registration hijacking

CyberCX understands that the threat actor undertook a social engineering attack, leveraging fraudulent identity documents, including passports, to impersonate and verify themselves as the legitimate domain owners to the domain registrar.

Using this access, the threat actor modified DNS records, including nameserver (NS) records and mail exchanger (MX) records, to threat actor controlled IP addresses. As a result, inbound emails to the domain were redirected to the attacker’s mail server. Notably in at least one instance, these emails were not redirected back to the legitimate mail servers.

By leveraging their control over the domain, the threat actor was able to perform the following attack chain to target software-as-a-service platforms associated with the domain:

Figure 1 – Threat actor attack chain

 

SaaS platform domain verification

In at least one instance, the threat actor performed a novel technique to add an external cloud account with the highest level of administrator permissions to the legitimate SaaS platform’s administration portal.

The threat actor was able to verify the domain on an external Atlassian organization, likely by adding TXT records to the compromised DNS, which enabled them to discover and centrally manage all Atlassian products associated with the domain by leveraging Atlassian Guard’s Automatic Product Discovery feature. This feature is intended to allow Atlassian organization owners to discover and take control of shadow IT infrastructure created by users in their domain.

In February 2024, as part of updated Automatic Product Discovery functionality, Atlassian introduced the ability for Organization Admins in the verified domain to join unmanaged Atlassian instances associated with the domain. These users are added with the Organization Admin role.

Figure 2 – Automatic Product Discovery “Join as admin” option, sourced from Atlassian documentation

 

The threat actor was able to abuse this functionality to add an external Gmail account from an external threat actor controlled Atlassian organization, after performing domain verification, to the legitimate Atlassian organization’s Administration portal as an Organization Admin. Using this access, the threat actor would have been able to remove all other Organization Admins, effectively taking control of their Atlassian organization and all associated Atlassian products including Confluence and Jira.

 

Email redirection

The threat actor also leveraged the email redirection to target SaaS platforms that utilise “magic link” passwordless authentication. By forcing authentication to domain accounts on these SaaS platforms, the threat actor was able to generate and intercept magic link URLs. Notably, some SaaS platforms such as Slack allow users to join all workspaces associated with the domain that have the “Allow invitations and approve invitations for any email address from these domains” option configured. The threat actor was observed accessing unmonitored Slack workspaces using compromised accounts and using Slack Connect to direct message users outside of the organisation as part of further social engineering attacks.

Microsoft’s self-service password reset portal was also abused for privileged account discovery using the automated emails generated using the “Contact your administrator” link to identify accounts with Helpdesk Administrator, Password Administrator, User Administrator or Global Administrator roles, as configured by default in Microsoft Entra ID.

 

Impact

CyberCX is not aware of any ransomware activity associated with this campaign, however, in multiple instances, the threat actor was able to successfully exfiltrate sensitive data and subsequently attempted to extort the compromised organisation.

 

Assessment

CyberCX Intelligence has observed limited public reporting relating to this technique.

CyberCX recommends organisations should work with their domain registrar to implement a domain registry lock, which will prevent any modifications to DNS server records, modification of contacts, transferring of domains or deletion of domain names without proper authentication. An out of band communication channel should further be established as part of this authentication procedure.

Additionally, organisations should audit their shadow IT infrastructure across all SaaS applications to ensure that they have sufficient visibility of all systems created by their domain users which have not been directly approved by the organisation.

 

MITRE ATT&CK mapping

Tactic 

Technique / Tool 

Mitre ID 

Reconnaissance

Gather Victim Identity Information

T1589

Resource Development

Compromise Infrastructure: Domains

T1584.001

Compromise Infrastructure: DNS Server

T1584.002

Initial Access

Valid Accounts: Cloud Accounts

T1078.004

Persistence

Valid Accounts: Cloud Accounts

T1078.004

Privilege Escalation

Account Manipulation: Additional Cloud Roles

T1098.003

Credential Access

Forced Authentication

T1187

Discovery

Account Discovery: Email Account

T1087.003

Lateral Movement

Remote Services: Cloud Services

T1021.007

Exfiltration

Email Collection: Remote Email Collection

T1114.002

 

 

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.