Software Secured Company Logo.
Services
Services
WEB, API & MOBILE SECURITY

Manual reviews expose logic flaws, chained exploits, and hidden vulnerabilities

Web Application Pentesting
Mobile Application Pentesting
Secure Code Review
Infrastructure & Cloud Security

Uncovers insecure networks, lateral movement, and segmentation gaps

External Network Pentesting
Internal Network Pentesting
Secure Cloud Review
AI, IoT & HARDWARE SECURITY

Specialized testing validates AI, IoT, and hardware security posture

AI Pentesting
IoT Pentesting
Hardware Pentesting
ADVANCED ADVERSARY SIMULATIONS

We simulate attackers, exposing systemic risks executives must address

Red Teaming
Social Engineering
Threat Modelling
PENETRATION TESTING AS A SERVICE

PTaaS provides continuous manual pentests, aligned with release cycles

Penetration Testing as a Service
OWASP TOP 10 TRAINING

Practical security training strengthens teams, shifting security left effectively

Secure Code Training
Ready to get started?
Identify real vulnerabilities confidently with zero-false-positive penetration testing
Learn More
Industries
Industries
INDUSTRIES
Data and AI

AI pentesting uncovers adversarial threats, ensuring compliance and investor trust

Healthcare

Penetration testing protects PHI, strengthens compliance, and prevents healthcare breaches

Finance

Manual pentests expose FinTech risks, securing APIs, cloud, and compliance

Security

Penetration testing validates SecurTech resilience, compliance, and customer trust

SaaS

Pentesting secures SaaS platforms, proving compliance and accelerating enterprise sales

CASE STUDY

“As custodians of digital assets, you should actually custodize assets, not outsource. Software Secured helped us prove that our custody technology truly delivers on that promise for our clients in both the cryptocurrency and traditional finance”

Nicolas Stalder,
CEO & Co-Founder, Cordial Systems
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Compliance
Compliance
COMPLIANCE
SOC 2 Penetration Testing

Pentesting validates SOC 2 controls, proving real security to auditors and customers

HIPAA Penetration Testing

Manual pentesting proves HIPAA controls protect PHI beyond documentation

ISO 27001 Penetration Testing

Pentests uncover risks audits miss, securing certification and enterprise trust

PCI DSS Penetration Testing

Pentesting validates PCI DSS controls, protecting sensitive cardholder data

GDPR Penetration Testing

GDPR-focused pentests reduce breach risk, regulatory fines, and reputational loss

CASE STUDY

“Software Secured’s comprehensive approach to penetration testing and mobile expertise led to finding more vulnerabilities than our previous vendors.”

Kevin Scully,
VP of Engineering, CompanyCam
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
PricingPortal
Resources
Resources
COMPLIANCE
Blogs
Case Studies
Events & Webinars
Partners
Customer Testimonials
News & Press
Whitepapers
API & Web Application Security Testing

The Highest Threat: The Hidden Weakness in Modern API & Web Application Security

Alexis Savard
November 21, 2025
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Login
Book a Consultation
Contact
Blog
/
API & Web Application Security Testing
/
Penetration Testing Methodology

Assessing the Risk: Sub-Domain Takeover via EC2 IP Takeover

Learn how EC2 IP takeover can lead to subdomain takeover vulnerabilities, and whether this emerging technique poses a real threat to your cloud infrastructure.

By Julian B
・
7 min read
Table of contents
Text Link
Text Link

Over the past year, several Software Secured clients have received reports from independent researchers claiming to have discovered previously unknown vulnerabilities in their infrastructure. While these reports were not extortionate in nature, they typically included a technical overview of the identified issue, a request for voluntary compensation if the information proved valuable, and a link to the sender’s consulting services.

A common thread among these reports was the vulnerability in question: (Sub)Domain Takeover via EC2 Instance IP Takeover. This article examines the mechanics behind this vulnerability and evaluates whether it presents a material risk to organizations.

What is a Subdomain Takeover?

Before assessing the reported vulnerability, it's important to understand the broader concept of subdomain takeover.

A subdomain takeover occurs when a subdomain (e.g., subdomain.example.com) points to a third-party service (such as GitHub Pages, Heroku, etc.) that is no longer in use. If the original service has been decommissioned or deleted, an attacker can register a resource on that service and configure it to respond to the orphaned subdomain—effectively taking it over.

‍

Source: Microsoft - Subdomain Takeover

This type of vulnerability is a favorite among bug bounty hunters and malicious actors alike due to its ease of discovery and potential for high impact. One notable case was reported to Uber by security researcher Arne Swinnen, who demonstrated the ability to steal session cookies via a subdomain takeover, leading to full account compromise.

Which Services Are Susceptible?

As awareness of subdomain takeovers has increased, many SaaS providers have adopted safeguards to prevent such attacks. However, not all platforms have implemented these protections, leaving gaps that attackers can exploit.

A continuously updated list of known vulnerable services and their associated indicators can be found here:
➡️ Can I Take Over XYZ?

AWS and Subdomain Takeover Risks

Within AWS, S3 and Elastic Beanstalk are commonly cited as potential vectors for subdomain takeovers. However, a less frequently discussed—but theoretically possible—attack involves EC2 instance IP takeover..

This method was outlined in a 2023 Medium post by a researcher known as "Zonduuhackerone." The premise is as follows:

  • A company uses an EC2 instance to host a domain or subdomain..

  • The EC2 instance is later decommissioned, but the associated DNS A record remains unchanged.

  • An attacker continuously allocates new EC2 public IP addresses, checking whether any domains or subdomains resolve to them.

  • If a match is found, the attacker temporarily controls the domain or subdomain.

As of the previously mentioned Medium article,, AWS owned a public IP space of approximately five million addresses. Meaning that the odds of matching a random recycled IP to an existing asset are slim, and AWS further mitigates abuse by rate-limiting IP allocation and banning suspicious accounts.

While this significantly limits the feasibility of a targeted attack, opportunistic actors—particularly bug bounty hunters—continue to test this method at scale.

Should Organizations Be Concerned?

In general, subdomain takeovers are a valid concern and can lead to significant security issues if left unchecked. However, EC2 IP-based takeovers appear to be more opportunistic than targeted. Based on the reports our clients have received, this activity may be better characterized as a form of aggressive marketing by independent researchers.

Reproducing this attack in a responsible manner is also highly impractical for consultancies or red teams. The process would involve the temporary takeover of numerous unrelated IPs and subdomains, which would violate cloud provider policies and unintentionally affect other organizations that are out of scope.

Recommended Actions for Organizations

While the specific risk posed by EC2 instance IP takeover is low, organizations should still maintain rigorous asset hygiene. Key recommendations include:

  • Regularly audit DNS records, particularly after decommissioning infrastructure.

  • Remove or update "dangling" subdomains that point to inactive services or IPs.

  • Implement monitoring for unexpected changes in DNS configurations or unresponsive subdomains.

Furthermore, organizations should establish a clear disclosure path for researchers who identify vulnerabilities. One increasingly adopted standard is the use of a security.txt file, which provides a machine-readable way for researchers to report issues responsibly.

Organizations should take proactive steps to manage and monitor their digital assets—especially domains, subdomains, and any infrastructure that has been decommissioned. Vulnerabilities such as dangling DNS records can be exploited if left unaddressed.

Key recommendations:

  • Monitor all assets
    Regularly review DNS records and ensure that domains and subdomains are not pointing to services or IPs that are no longer in use.

  • Treat EC2 IP takeover takeovers with context
    While (Sub)Domain Takeover via EC2 instance IP takeover is technically possible, it’s a low-risk and opportunistic attack. Rather than focusing on this specific method, prioritize overall DNS hygiene and asset lifecycle management.

  • Review unsolicited vulnerability reports carefully


    • Take all reports seriously, but verify them thoroughly.

    • Some may be well-intentioned; others could be part of self-promotion or based on weak evidence.

  • Establish a clear vulnerability disclosure process
    If you haven’t already:


    • Implement a method for researchers to report security issues.

    • A good starting point is the use of a security.txt file, a proposed standard for making disclosure contact information accessible.

Without a clear reporting path, valid findings may be overlooked—and potentially exploited by malicious actors.

About the author

Julian B

Julian is an intermediate penetration tester with nearly five years of experience working in cybersecurity, dedicated to penetration testing, open-source intelligence gathering, and moving the needle forward for organizations across Canada. He regularly engages with the community through presentations at conferences, on a range of topics including vulnerability research and OSINT investigations. This is work is underlined by several CVEs which have been attributed to his research on open-source applications.

Continue your reading with these value-packed posts

API & Web Application Security Testing

7 Steps to Comprehensive Penetration Testing

Cate Callegari
Cate Callegari
7 min read
May 16, 2022
API & Web Application Security Testing

What Are the Differences Between Different Open Source Fuzzing Tools

Omkar Hiremath
Omkar Hiremath
10 min read
March 24, 2023
Penetration Testing Services

The Best of Both Worlds: Combining Pentesting and Bug Bounties for Maximum Security

Cate Callegari
Cate Callegari
8 min read
November 21, 2024

Get security insights straight to your inbox

Helping companies identify, understand, and solve their security gaps so their teams can sleep better at night

Book a Consultation
Centralize pentest progress in one place
Canadian based, trusted globally
Actionable remediation support, not just findings
Web, API, Mobile Security
Web App PentestingMobile App PentestingSecure Code Review
Infrastructure & Cloud Security
External Network PentestingInternal Network PentestingSecure Cloud Review
AI, IoT & Hardware Security
AI PentestingIoT PentestingHardware Pentesting
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
More Services
Pentesting as a ServiceSecure Code Training
Industries
Data and AIFinanceHealthcareSecuritySaaS
Compliance
GDPR PentestingHIPAA PentestingISO 27001 PentestingPCI DSS PentestingSOC 2 Pentesting
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
Security & CompliancePrivacy PolicyTerms & Conditions
2025 ©SoftwareSecured