LinkedIn Tag
Blog
Blog

Expired Domain Risks: A Real Example from Oracle’s Website

An expired domain reference is all an attacker needs to execute phishing under a trusted origin. This blog looks at an example from Oracle’s code.

Nov 25, 2025 4 min read
Juan Combariza
Juan Combariza Growth Marketer

At cside, we continuously monitor websites for anything suspicious so we can protect users before attacks happen. Recently, we spotted an interesting case involving a well-known website : `Oracle`.

While reviewing one of Oracle’s public JavaScript files we noticed it contained a link to a domain that has expired.

`https://www.oracle.com/asset/web/js/settings-v2.js`

This blog highlights the risks of forgotten or expired domains in client-side code. This is not an old or rare problem,  it can happen to both big and small companies, and it can easily open the door to a supply chain attack.

Note: Our team reported this finding to Oracle, who remediated it quickly. The purpose of this blog is to examine the security implications from a defensive standpoint. It should not be interpreted as guidance for exploitation or novel attack development

The Expired Domain in Question

Some portions in this section are written in the present tense as they were taken directly from conversations with our security analyst. 

The expired domain is:

`ociforums.com`

expired-domain-attack-breakdown-cside
Screenshot: Identifying an expired domain

Visiting it now redirects to:

`https://expireddomains.com/domain/ociforums.com`

purchase-expired-domain-attack-example-oracle-cside
Screenshot: Purchasing an expired domain

(screenshot was taken at the time of discovery, this has since been remediated).

Inside Oracle’s JavaScript file, there’s a reference to:

`http://ccc.ociforums.com/`

expired-domain-vulnerability-detection-cside
Screenshot: Expired domain in Oracle's code (now remediated)

This link appears in the website code as part of a message shown to users when no live chat agents are available. Because the domain is expired and up for sale, anyone could purchase it and use it for malicious purposes.

Why This Expired Domain Was A Security Risk

Here’s the exact snippet from the file:

ocFeedback: {
  en: "Sorry, no agents are available... post your question at <a href='http://ccc.ociforums.com/'>http://ccc.ociforums.com/</a>..."
}

This message is shown to users who are already looking for help. They are more likely to trust the link as a legitimate Oracle support page. If an attacker bought the domain, several risks could follow:

  1. Phishing: The attacker could create a fake forum that looks like Oracle’s and trick users into sharing their account credentials.
  2. Malware Hosting: The domain could deliver malicious downloads or run exploit kits.
  3. SEO Abuse: Because the domain might still have good search rankings, it could show up in searches for Oracle support and lead people to the fake site.
  4. Brand Damage: If users are tricked, they may blame Oracle and lose trust in the brand.

Long-Term Risk: The link is hardcoded into the JavaScript, meaning every site using this widget would need an update. If not patched quickly, the exposure lasts.

Example Attack Scenario

  • A user tries to get Oracle support but no agents are available.
  • The message tells them to visit ccc.ociforums.com.
  • The domain is now owned by an attacker.
  • The user clicks and is asked to log in with their Oracle credentials.
  • The attacker collects the credentials and can also deliver malware or launch other scams.

What The cside Team Did

We reached out to Oracle and informed them about the expired domain issue. They proceeded very quickly to purchase the domain back and gave us credit on their security reporting programs. We applaud Oracle for their fast response.

This situation highlights how website complexity and exposure over time can become a struggle even for organizations that are impressively well prepared for any security incident. Client-side security is an often overlooked space and this unfortunately applies to businesses of all sizes.

What Could Have Prevented an Expired Domain Attack?

If we played out the scenario where an attacker did get access to this domain: CSP and SRI would have both missed this.

CSP and SRI Would Fail:

CSP (Content Security Policy) and SRI (Sub Resource Integrity) are commonly used client-side defense mechanisms. CSP validates where requests originate, not whether the destination is still safe. The browser will allow the request regardless of who owns the domain now. SRI ensures file integrity only when the developer controls the resource. In this case, the reference was a hyperlink rendered inside the UI, not an external script dependency protected by a hash.

Client-side Security Catches Signs of an Expired Domain Attack:

A client-side security platform such as cside continuously observes how scripts behave at runtime. If a domain suddenly starts issuing redirects, collecting key strokes, serving unexpected JavaScript, or returning unusual response patterns, the shift in behavior becomes an immediate red flag. An alert would be triggered for security teams to inspect.

How does cside protect me from an expired domain attack?

cside monitors the behavior of scripts on your website. If a previously benign domain suddenly begins serving suspicious JavaScript, redirecting users, or making unexpected network calls, cside flags that behavioral change in real time and alerts your team to review. 

Why are expired domains a security risk for modern websites?

When a domain expires, anybody (including attackers) can purchase it. If your website is fetching code from that domain through a 3rd party script, that code can be adjusted and served to your users through a “trusted domain”. Attackers can also use expired domains for SEO abuse or phishing redirects.

Would CSP protect against a compromised expired domain?

No. CSP wouldn’t block a domain if it is set to be a “trusted” source even if a new owner takes control of the domain.

Juan Combariza
Growth Marketer Juan Combariza

Researching & writing about client side security.

Don't just take our word for it, ask AI

Related Articles