Home Services Blog Contact

Introducing Heimdall: DNS Lifecycle Management to Prevent Subdomain Takeovers

In the ever-expanding landscape of cloud infrastructure, organizations are spinning up and tearing down resources faster than ever. But what happens to the DNS records pointing to those deprecated resources? In many cases, they're simply forgotten—leaving a critical security gap that attackers are increasingly eager to exploit.

We built Heimdall to solve this problem. Named after the all-seeing Norse god who guards the Bifröst bridge, Heimdall is our DNS lifecycle management platform that continuously monitors your attack surface for dangling DNS records and subdomain takeover vulnerabilities.

What is a Subdomain Takeover?

A subdomain takeover occurs when an attacker gains control of a subdomain that belongs to your organization. This typically happens when a DNS record (usually a CNAME) points to an external service that has been deprovisioned, but the DNS record itself was never removed.

Anatomy of a Subdomain Takeover

1
Service Created
blog.company.com → company.azurewebsites.net
2
Service Deleted
Azure resource removed, DNS record forgotten
3
Attacker Claims
Attacker creates company.azurewebsites.net
4
Takeover Complete
blog.company.com now serves attacker content

Why Should You Care?

Subdomain takeovers are not theoretical—they're happening constantly. The impact can be severe:

⚠️ Real-World Consequences

Credential theft: Attackers can host convincing phishing pages on your legitimate subdomain. Since the domain is genuinely yours, browsers show no warnings and users have no reason to be suspicious.

The Scale of the Problem

We've scanned thousands of domains across various industries and the numbers are sobering. In a recent assessment of Fortune 500 companies, we found that 67% had at least one dangling DNS record pointing to a claimable cloud resource. Many had dozens.

The root cause is simple: there's no enforcement mechanism tying DNS lifecycle to infrastructure lifecycle. When a developer tears down an Azure App Service or an S3 bucket, nothing reminds them to clean up the DNS record. Over time, these orphaned records accumulate like digital landmines.

Introducing Heimdall

Heimdall started as an internal tool our penetration testing team used to find subdomain takeover vulnerabilities during red team engagements. We realized that the same technology could help organizations proactively defend themselves, so we productized it.

🔍 Continuous Discovery

Automatically enumerate subdomains using DNS brute forcing, web scraping, and passive reconnaissance sources

☁️ Cloud-Aware Scanning

Native integration with Azure, AWS, and GCP to detect dangling resources before attackers do

🚨 Real-Time Alerts

Instant notifications when new vulnerabilities are detected, with severity classification and remediation guidance

🔄 Automated Scheduling

Configure scan frequencies per asset group—from continuous monitoring to weekly audits

Heimdall Scheduled Tasks Interface
Heimdall's scheduled tasks dashboard showing automated scans running every 30 minutes across multiple codenames. Tasks can run vulnerability scanners, refresh DNS records, or execute full reconnaissance pipelines.

Multi-Scanner Architecture

Heimdall doesn't rely on a single detection method. It orchestrates multiple specialized scanners to maximize coverage:

Offensive & Defensive Modes

Heimdall can operate in two modes. In defensive mode, it alerts your security team to vulnerabilities for remediation. In offensive mode (used during authorized penetration tests), it can automatically claim vulnerable resources to prove exploitability and prevent real attackers from getting there first.

Codename-Based Organization

Large organizations often have complex domain portfolios spanning multiple business units, acquisitions, and projects. Heimdall uses a "codename" system to organize assets:

Pipeline Automation

Security automation shouldn't be a one-off scan. Heimdall's pipeline system lets you build multi-stage workflows:

Pipeline: Full Reconnaissance
├── Stage 1: Subdomain Enumeration (Multiple Sources)
├── Stage 2: DNS Resolution & Record Analysis
├── Stage 3: Azure Resource Correlation
├── Stage 4: Takeover Vulnerability Scan
└── Stage 5: Alert Generation & Reporting

Pipelines can be triggered on schedule, via webhook, or manually. Each stage's output feeds into the next, building a comprehensive picture of your external attack surface.

Getting Started

Heimdall is currently available as a managed service for Fjord.AI clients. We handle the infrastructure, maintain the scanner signatures, and provide expert triage of findings. For organizations with specific compliance requirements, we also offer on-premise deployment options.

A typical onboarding looks like this:

  1. Asset Discovery: Provide your root domains, and we'll enumerate the full subdomain landscape
  2. Baseline Scan: Initial comprehensive scan to identify existing vulnerabilities
  3. Remediation Support: Our team helps prioritize and guide cleanup of dangling records
  4. Continuous Monitoring: Ongoing scans catch new vulnerabilities as your infrastructure evolves

Beyond Detection: DNS Hygiene Best Practices

While Heimdall provides the visibility layer, true DNS lifecycle management requires process changes:

Protect Your Attack Surface

Don't let forgotten DNS records become your next breach headline. Let's assess your subdomain security posture.

Request a Demo