Broken Link Hijacking
Broken Link Hijacking
Source: https://proviesec.medium.com/
In short,
1
Broken link hijacking is an attack that takes advantage of expired,
unlinked, or inactive external links embedded in a web page. For
example, suppose an application uses resources or third-party
services loaded from an external URL.
Even so, dead link checkers can only detect a small number of
potential BLH targets because they can only find BLH if the link
fails. If the domain provider decides to create their own redirect
and landing page for every URL within an expired domain (as is
standard practice), crawls will not be able to distinguish between
this placeholder and a valid page.
2
researchers were asked if they check for broken links as part of
bug bounty programs, the vast majority said no.
4
Impacts of Broken Link Hijacking
• Defacements: By purchasing expired domains and using the
broken links on websites/ web applications, attackers can
engage in defacements. They can change your original
content to their malicious or offensive content. This could
lead to an erosion of the company’s reputation, customer
attrition, and distribution of malware.
Several celebrity social media accounts have been affected
by BLH attacks.
• Stored XSS Attacks: Often, companies load scripts from
external locations/ resources for several reasons. For instance,
Caching JavaScript (JS) to speed up page loading
Separation of HTML and JS for easier maintenance
Link to traffic analysis, etc.
If these links are broken, the attacker may take over the
domain or resources and substitute the scripts. This leads to
stored XSS attacks with malicious scripts loading
automatically on the web pages with every visit.
• Impersonation:Another big risk associated with BLH is
impersonation. Broken link hijackers leverage expired
endpoints (expired domains, deleted social media accounts,
etc.) at the end of broken links to impersonate companies and
high-profile users. This causes heavy reputational and
financial damage.
5
For instance, a company may delete a social media account
but leave the link on their website. The hijacker will simply
create an account with that name and post something
objectionable or engage in phishing, posing as the company.
• Other Security Risks include:
1. Content Hijacking
2. Information Leakage
3. Phishing Attacks
Mitigations
• Regularly monitor and update external links
• Manage expired domains proactively
• Use caution with third-party services
• Implement link cloaking (carefully)
• Keep software updated
• Employ security measures
• Stay informed about BLH techniques
6
References
➔ https://www.acunetix.com/blog/web-security-zone/broken-
link-hijacking/
➔ https://www.cobalt.io/blog/hunting-for-broken-link-
hijacking-blh
➔ https://www.indusface.com/blog/what-is-broken-link-
hijacking/
➔ https://proviesec.medium.com/broken-link-hijacking-what-it-
is-and-how-to-get-bounties-with-it-ca64db6a3f74
➔ https://gemini.google.com/