{"id":23429,"date":"2019-08-13T17:35:58","date_gmt":"2019-08-13T22:35:58","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=23429"},"modified":"2019-09-04T16:37:54","modified_gmt":"2019-09-04T21:37:54","slug":"how-hackers-use-expired-domains-to-steal-data","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/","title":{"rendered":"How Hackers Can Use Your Expired Domains to Steal Data"},"content":{"rendered":"\n<p>When businesses and blogs rename or merge, old domains sometimes get left behind. Security researchers say expired domains can put data at risk. <\/p>\n\n\n\n<p>Scammers may set up fake shops on expired domains and use them to steal credit card data from unwary bargain hunters. Or they may target email accounts linked to the domain to scam clients, steal company secrets and break into employees\u2019 shopping and travel accounts.<\/p>\n\n\n\n<p>Prevention is as easy as renewing and protecting all your domains-but that\u2019s not always simple, especially if you own a lot of <a href=\"https:\/\/www.hostgator.com\/domains\">domains.<\/a> Here\u2019s what you need to know about your risks when a domain expires and how to keep yours current.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"https:\/\/www.hostgator.com\/domains\"><img loading=\"lazy\" decoding=\"async\" width=\"470\" height=\"60\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2017\/12\/Domains.png\" alt=\"register domain name\" class=\"wp-image-18322\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2017\/12\/Domains.png 470w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2017\/12\/Domains-300x38.png 300w\" sizes=\"(max-width: 470px) 100vw, 470px\" \/><\/a><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Happens When Domains Expire?<\/h2>\n\n\n\n<p>The first thing you need to know is that when domains expire, they\u2019re available to anyone who wants to pay to register them. They\u2019re also easy to find online, through sites that offer expired domain name searches and lists of recently expired domains to bid on. Some buyers buy expired domains for legitimate projects. Others are not so ethical.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Your expired domain could end up as a fake online store<\/h3>\n\n\n\n<p>Criminal gangs snap up expired domains to turn them into phishing sites. That damages the brands that lose their domains, the brands impersonated by the scammers, and shoppers who fall for the scam.&nbsp;<\/p>\n\n\n\n<p>Security blogger Brian Krebs profiled a <a href=\"https:\/\/krebsonsecurity.com\/2018\/11\/that-domain-you-forgot-to-renew-yeah-its-now-stealing-credit-cards\/\" target=\"_blank\" rel=\"noopener noreferrer\">photographer whose old portfolio domain was turned into a fake athletic shoe store after her registration lapsed<\/a>. Thieves used it to steal credit card data for resale on the dark web.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"524\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/image-2-1024x524.png\" alt=\"example of expired domain used to steal credit card data\" class=\"wp-image-23442\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/image-2-1024x524.png 1024w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/image-2-300x154.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/image-2-768x393.png 768w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/image-2.png 1504w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>For the photographer, the damage went beyond the loss of her website. She had no way to access social media accounts that were linked to her domain email address, because the scammers changed her passwords. Now the domain that used to host her portfolio redirects to the official adidas website, after adidas and Reebok sued the scammers who exploited her expired domain along with hundreds of others.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Your expired domain could let data thieves into your business<\/h3>\n\n\n\n<p>Last year, security researchers with Australian cybersecurity firm Iron Bastion proved that registering abandoned business and law firm domains could give criminals access to insider data. <\/p>\n\n\n\n<p>By setting up a catch-all email forwarding service for domains they re-register, criminals can access confidential client data and emails. They can run scams using this information or sell it on the dark web. They can also take over former employees\u2019 social media, banking, and professional accounts by changing the passwords linked to the old domain\u2019s email addresses.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What should you do with domains you don\u2019t use anymore?<\/h3>\n\n\n\n<p>Security experts say the best way to safeguard your old domains is to <a href=\"https:\/\/www.hostgator.com\/blog\/cost-renew-domain-name\/\">keep renewing them<\/a>, even if you\u2019re not currently using them. Then you should close the email accounts associated with those domains and unlink those email accounts from alerts sent by banks, airlines, and other services that handle sensitive (and valuable) information.<\/p>\n\n\n\n<p>If you must let your old domains go, you\u2019ll need to be thorough about updating any online accounts you and your employees set up using old domain email addresses. Then you\u2019ll need to close those email accounts.<\/p>\n\n\n\n<p>In either case, it\u2019s wise to let your customers and vendors know about your change of email address. Give them some advance notice, ask them to whitelist your new email address, and then ask them to delete the old address when you\u2019ve closed that account.&nbsp;<\/p>\n\n\n\n<p>For any email account on any domain, it\u2019s always a good idea to set up two-factor authentication (2FA). By requiring a code from an SMS message or an authenticator app, you reduce the risk of someone maliciously changing your password on your email account and other accounts you set up with your email address.&nbsp;<\/p>\n\n\n\n<p>And speaking of passwords, don\u2019t make it easy for hackers to guess or brute-force yours. Every email address on your domains should have a <a href=\"https:\/\/www.hostgator.com\/blog\/setting-secure-password-remember\/\">strong password<\/a> that\u2019s not used for any other accounts.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How can you keep all your domains current and safe?<\/h3>\n\n\n\n<p>Follow these recommendations from domain security experts to keep your domains in your possession.<\/p>\n\n\n\n<p><strong>Give your domain registrations fewer chances to lapse.<\/strong> Start by registering or renewing for the longest amount of time you can, like three years instead of one. Then set your registrations to auto-renew.&nbsp;<\/p>\n\n\n\n<p><strong>Keep your registration information up to date.<\/strong> Update your domain registration accounts when your email address, phone number, or other contact information changes. Changed credit cards or online payment services? Make sure you change your domain payment information, or your auto-renewals will fail.<\/p>\n\n\n\n<p><strong>Keep your registration information private.<\/strong> <a href=\"https:\/\/www.hostgator.com\/blog\/domain-privacy\/\">Domain privacy protection<\/a> costs a few dollars a year, and it\u2019s worth it. If you add domain privacy when you <a href=\"https:\/\/www.hostgator.com\/blog\/how-register-domain-name-hostgator\/\">register your domain<\/a>, your registrar\u2019s contact information is listed in the WHOIS public database. Without domain privacy, your name, email address, and other personal data are on display. That can put you at risk for spam, scams, and harassment.&nbsp;<\/p>\n\n\n\n<p><strong>Lock your domains.<\/strong> Domains must be unlocked when you\u2019re transferring them to a new host. Otherwise, lock them to keep scammers from transferring them to a different web host without your consent.&nbsp;<\/p>\n\n\n\n<p>In HostGator\u2019s Customer Portal, you can lock your domains for free.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Navigate to <em>Domains<\/em> in the left sidebar.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/H6xrUvaWbsE1pTdJkylki5AlmYbnExbJU2iJHlgYYfcEF8VkJKbNBkt4nC7FzsEl62VfUWnHNv6KUbVxi0aCT5S2YHbdlEITdBOujbhdBYG_Cfn_7UCCSzcn4avIJZPZF3rDXhw4Z8ah7KThDg\" alt=\"how to lock domains in hostgator\"\/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Under <em>Manage Domains<\/em>, you have the option to lock all your domains at once.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/SMV3b2L4fG7xNELTPhEhqZ0sEQHV4tWUEXwHG4DuwbBs1fN_Xvx2I7RiS2tcnvsYR0QBC1wHr-vDmpVIFvVUGBtTDlrp9IV2UJgcdjTQY_msyhDfQbQ_E3uMfoeiwVBmqFlZInIVjo26eKqIJA\" alt=\"hostgator manage domains and lock\"\/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>You can also click the <em>More<\/em> button for any of your domains to lock one at a time. Under <em>Domain Overview<\/em>, click the <em>Change<\/em> link next to <em>Locking<\/em>. That takes you to Domain Locking. Then you just move the switch to Locking ON and click <em>Save Domain Locking<\/em>.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/5Y1nr-CYVr439t-V6z_Xb9MMQKhd9-wqP68lXFiPqSyLlLWtlqC7vlvpg5P1zW8Ip0Vz_L5zI3d8VKRRUvtWHsVh-fjg2SBW2PmNgYMkWl6-TCj5RneOpzRkrxDWWkrdbVyrna3nXMes-C0Mgw\" alt=\"domain locking with hostgator\"\/><\/figure><\/div>\n\n\n\n<p>Now your domain is protected against theft by unauthorized transfer. And with auto-renew in place and <a href=\"https:\/\/www.hostgator.com\/blog\/cybersecurity-basics-small-business-website\/\">good cybersecurity practices<\/a>, your domains are safe from expiration and exploitation.<\/p>\n\n\n\n<p><strong><em>Ready for a new domain? <\/em><\/strong><\/p>\n\n\n\n<p>HostGator now offers new customers a year of free domain registration with selected hosting packages and top-level domains. Sign up for 12 or more months of hosting, register a .com, .net, or .org top-level domain, and get the first year\u2019s domain registration for free. See complete offer details <a href=\"https:\/\/www.hostgator.com\/#free-domain\">here<\/a>.&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When businesses and blogs rename or merge, old domains sometimes get left behind. Security researchers say expired domains can put&#8230;<\/p>\n","protected":false},"author":162,"featured_media":23424,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[104,118,140],"class_list":["post-23429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-and-hosting-tips","tag-featured","tag-register-domain","tag-website-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers Can Use Your Expired Domains to Steal Data - HostGator<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Can Use Your Expired Domains to Steal Data\" \/>\n<meta property=\"og:description\" content=\"When businesses and blogs rename or merge, old domains sometimes get left behind. Security researchers say expired domains can put...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-13T22:35:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-04T21:37:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1152\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Casey Kelly-Barton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HostGator\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Kelly-Barton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/\"},\"author\":{\"name\":\"Casey Kelly-Barton\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\"},\"headline\":\"How Hackers Can Use Your Expired Domains to Steal Data\",\"datePublished\":\"2019-08-13T22:35:58+00:00\",\"dateModified\":\"2019-09-04T21:37:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/\"},\"wordCount\":1045,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png\",\"keywords\":[\"featured\",\"Register Domain\",\"Website Security\"],\"articleSection\":[\"Web Hosting Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/\",\"name\":\"How Hackers Can Use Your Expired Domains to Steal Data - HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png\",\"datePublished\":\"2019-08-13T22:35:58+00:00\",\"dateModified\":\"2019-09-04T21:37:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png\",\"width\":1152,\"height\":603,\"caption\":\"How Hackers Can Use Your Expired Domains to Steal Data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Can Use Your Expired Domains to Steal Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\",\"name\":\"Casey Kelly-Barton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"caption\":\"Casey Kelly-Barton\"},\"description\":\"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention\",\"sameAs\":[\"http:\/\/caseykellybarton.com\/\"],\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Hackers Can Use Your Expired Domains to Steal Data - HostGator","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/","og_locale":"en_US","og_type":"article","og_title":"How Hackers Can Use Your Expired Domains to Steal Data","og_description":"When businesses and blogs rename or merge, old domains sometimes get left behind. Security researchers say expired domains can put...","og_url":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2019-08-13T22:35:58+00:00","article_modified_time":"2019-09-04T21:37:54+00:00","og_image":[{"width":1152,"height":603,"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png","type":"image\/png"}],"author":"Casey Kelly-Barton","twitter_card":"summary_large_image","twitter_creator":"@HostGator","twitter_site":"@HostGator","twitter_misc":{"Written by":"Casey Kelly-Barton","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/"},"author":{"name":"Casey Kelly-Barton","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a"},"headline":"How Hackers Can Use Your Expired Domains to Steal Data","datePublished":"2019-08-13T22:35:58+00:00","dateModified":"2019-09-04T21:37:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/"},"wordCount":1045,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png","keywords":["featured","Register Domain","Website Security"],"articleSection":["Web Hosting Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/","url":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/","name":"How Hackers Can Use Your Expired Domains to Steal Data - HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png","datePublished":"2019-08-13T22:35:58+00:00","dateModified":"2019-09-04T21:37:54+00:00","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/08\/How-Hackers-Can-Use-Your-Expired-Domains-to-Steal-Data.png","width":1152,"height":603,"caption":"How Hackers Can Use Your Expired Domains to Steal Data"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/how-hackers-use-expired-domains-to-steal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Hackers Can Use Your Expired Domains to Steal Data"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a","name":"Casey Kelly-Barton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","caption":"Casey Kelly-Barton"},"description":"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention","sameAs":["http:\/\/caseykellybarton.com\/"],"url":"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/23429"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=23429"}],"version-history":[{"count":3,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/23429\/revisions"}],"predecessor-version":[{"id":23449,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/23429\/revisions\/23449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media\/23424"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=23429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=23429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=23429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}