Latest Website Security and Cybersecurity Updates

Call now for Live Immediate AssistanceCall+1 (844) 260-2204

The Legend of an Outdated WHOIS Server

December 09, 2022 | By Admin

1 Star2 Stars3 Stars4 Stars5 Stars (16 votes, average: 4.75 out of 5)

Expired WHOIS Server

Expired WHOIS Server

SEO spam attacks on compromised websites may be common, as we cover them quite frequently. Yet, shedding light on a black hat tactic used to infiltrate WHOIS results for a domain name is complex and unique, as it is not a common occurrence.

“WHOIS” is a protocol that is used to verify who owns a unique domain name. Simply put, these records are available to everyone to create trust online through the visibility of the website owner's name, address, and phone number.  Yet if website owner is interested in safeguarding their personal information, they are required to purchase the WHOIS server protection service.

WHOIS Server Hack – A Quick Outline

Recently, a WHOIS service user got upset about the changes in his records, as well as email notifications he received that were carrying spam content. Research revealed that hackers had taken advantage of customers' domain expiration by purchasing a previously legitimate WHOIS server. They then included arbitrary and unauthorized ads in this newly purchased old South African WHOIS server records.

The country code is used for a top-level domain official in South Africa. A search to locate the official WHOIS server for the client (CNAME came back with nothing wrong. But, the changes made in the WHOIS server contained details of what was changed and this was where things got really interesting.

WHOIS Server Showed Records of Spam Content

The WHOIS changelog demonstrated a new set of spam links that were included in all outgoing email notifications. Even though all the spam emails looked similar, there was a strong clue at the end of each email redirecting users to another site - "Why would queries go to instead of"

Investigating the WHOIS Server

Researchers immediately ran a query to dig deeper on "whois whois:".

You guessed it: the results indicated that the domain name had something to do with the issue. So, performing a root cause analysis by installing Brew with an updated version of WHOIS 5.2.12 caused a different result where the client information had been redacted.

The fetched results paved the way to further narrow down on the real problem!

Scanning The Registry Website

On visiting the WHOIS server site – hxxp://whois[.], it promptly redirected to the legitimate website, –.

However, upon visiting hxxp://www.whois[.], it redirected to a completely different site and numerous ads started to crowd the screen immediately. Bingo!

This proved that domain – was hacked.

The DNS records were culled out and it showed that the bare domain and subdomain were configured to different servers.

The hxxp://whois[.]co. za showed a clean version while hxxp://www.whois[.] was spam-filled. Another WHOIS query was run and this time it clearly pointed out which server to use.

In the end, it was revealed that some hacker gained access into the domain and replaced it on April 22nd. Since then, clients started receiving unsolicited ads in their notification emails.

Enterprise website security

Outdated WHOIS Server

The problem occurs with versions of WHOIS older than 5.0.19. In 2009, the whois[.] domain was removed in version 4.7.33. A hacker capitalized by purchasing it after the domain expired to send advertisements.

On the other hand, WHOIS versions older than 5.0.19 will go on to see such messages when querying domains. The issue has been reported to the South African registrar.


All users need to keep track of their WHOIS records to stay rest assured that the hackers are not making any illegal changes or compromises to their WHOIS server. We will keep you posted here if there are any further developments with the issue.


Related Resource

Website Status

Website Backup

Cheap Content Delivery Network

Best CDN List


Pay as You Go CDN

Free CDN

Website Vulnerability Scanner

Vulnerability Scanner