Exclusive: Prestigious University Domains Hijacked to Serve Porn and Malware – Investigation Reveals Lax Security

By

Breaking: Top University Websites Infiltrated with Explicit Content

Subdomains of some of the world's most prestigious universities are currently being exploited to serve explicit pornography and malicious scam pages. A new investigation reveals that 34 institutions, including UC Berkeley, Columbia University, and Washington University in St. Louis, have inadvertently allowed scammers to hijack thousands of their subdomains.

Exclusive: Prestigious University Domains Hijacked to Serve Porn and Malware – Investigation Reveals Lax Security
Source: feeds.arstechnica.com

Researcher Alex Shakhov discovered that hijacked URLs such as https://causal.stat.berkeley.edu/ymy/video/xxx-porn-girl-and-boy-ej5210.html and https://conversion-dev.svc.cul.columbia.edu/brazzers-gym-porn redirect users to hardcore porn. In at least one case, a subdomain of Washington University leads to a fake malware alert that pressures victims to pay a removal fee.

How the Hijacking Works

According to Shakhov, the scammers—linked to a group known as Hazy Hawk—are exploiting a basic administrative oversight. When universities create subdomains, they set up a CNAME record that points the subdomain to another domain. When the subdomain is decommissioned, the record often remains active.

"It's a simple clerical error that they never clean up," Shakhov explained. "Hazy Hawk scans for these orphaned records and then registers the external domain they point to, instantly taking over the subdomain." The attackers then load the subdomain with porn or scam content, leveraging the university's trusted .edu reputation.

Background: A Widespread but Overlooked Vulnerability

The CNAME hijacking technique is not new, but its scale at elite universities is alarming. Shakhov found that Google's search results list thousands of such compromised pages. The affected subdomains range from academic departments to administrative tools, all now serving illicit material.

Exclusive: Prestigious University Domains Hijacked to Serve Porn and Malware – Investigation Reveals Lax Security
Source: feeds.arstechnica.com

Security experts warn that the real danger extends beyond porn. "Users who stumble onto a hijacked .edu page may trust it and fall for tech support scams," noted a cybersecurity analyst familiar with the investigation. "Even a single click on a fake antivirus notification can lead to malware installation."

What This Means for Users and Universities

For website visitors, any interaction with a compromised university subdomain poses risks. The lax record-keeping creates an attack surface that can be exploited for phishing, malware distribution, and brand damage.

Universities must immediately audit their DNS records and remove orphaned CNAME entries. "This is not just about embarrassment—it's a security risk to students, faculty, and the public," Shakhov emphasized. Institutions should implement automated tools to detect and delete stale subdomain records.

The full scope of the abuse is still emerging. Shakhov is continuing to catalog hijacked domains and expects the list to grow. "We're seeing the tip of an iceberg," he said.

Related Articles

Recommended

Discover More

10 Things You Need to Know About the FakeWallet Crypto Stealer Spreading Through iOS AppsonebetonebetTesla's FSD V14 Lite Promise: A Band-Aid for Angry HW3 Owners Abroad?soc88s666Cloudflare Agents Now Handle Account Setup, Domain Purchase, and Deployment AutomaticallywvipStudent Voices: What Truly Makes EdTech Effectivewvips666bet365bet365Hearts in Space: Why Human Organs Shrink but Lab-Grown Ones Thrivesoc88