Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementCybersecurity News

Is Hacking Back with WHOIS a Good Idea?

By Jonathan Zhang
Been Hacked? Let That Be a Lesson to You
July 19, 2019

Ever heard the term “hack-back”? Hacking back is the process of identifying attacks on a system and their origin. It can be likened to reverse engineering hacking efforts where security consultants and other professionals try to anticipate attacks and work on adequate responses. 

There has been a lot of heated debate on the subject in recent years but for this post, we’ll focus on answering two questions: (1) Can a hack back be done with the help of a WHOIS database? (2) Is doing so a good idea?

Is Hacking Back Possible Using WHOIS Databases?

First off, let’s list down what information a WHOIS database provides. It gives you data on many of the existing TLDs on the Internet today, including complete WHOIS records of domains in both the gTLD and ccTLD spaces.

The only drawback would be, how would you know if the domain owner is truly guilty of the cybercrime? You probably can’t. We all know that cybercriminals are known for compromising legitimate websites and pages for their own malicious gains. In many cases, the owners of these digital assets are not aware that their intellectual property is being used to commit fraud. The domains could have just been pwned and are now spreading mayhem.

So even if a WHOIS database gives you all the information on a domain, a thorough investigation still needs to be done before you can tell if a domain is truly malicious or has just been compromised. That brings us to the second question.

Is Hacking Back a Good Idea?

This has been a much-debated topic in the past few years. Some experts opine that it isn’t because of reasons that include:

  • Collateral damage: The domain’s owner may not be aware of illegal doings tied to its systems. This happened in Vitalwerks’s case in 2014 when Microsoft decided to hack-back the NJrat and NJw0rm attackers. Redirecting the traffic from the Vitalwerks domains to Microsoft’s own servers for malware detection caused problems for the victim’s customers. Sometimes, even the best of intentions can have serious and unwanted repercussions.
  • Legal implications: Despite the introduction of the Active Cyber Defense Certainty Act in 2017, private companies still have no legal right to defend themselves against cyber attacks. Attribution remains the biggest challenge for law enforcement agencies to this day as unlike physical crimes, virtual crimes don’t leave much of a trace to tie suspects to a malicious deed. Putting someone in jail requires definitive evidence that, unfortunately, is a lot harder to get when you’re dealing with cyber attacks. Note too that as in real life, only those in law enforcement can actually launch investigations on suspected criminals.

There have been instances, however, where private cybersecurity companies have been tapped by agencies such as the FBI, INTERPOL, or Europol to help out in cybercriminal investigations. Even in these scenarios though, the companies only aided in obtaining circumstantial evidence and providing technical expertise. They weren’t allowed to hack the attackers’ systems back.

Putting two and two together gives us this: It’s perfectly legal for you to protect your own digital assets using all the tools at your disposal—and yes, WHOIS databases can help—but going after cybercriminals yourself may not be a good idea.

If you’re very sure an attacker is using a certain domain for a crime against your business, block it from accessing your website and pages but don’t go any further than that. Report its suspicious doings to the proper authorities, they usually have hotlines for this. Let them handle the situation and just hand in your findings if you’re asked for evidence.

Keep in mind that though WHOIS databases can be a great tool for beefing up your cyber defenses, taking the law into your own hands can have serious repercussions for you and the accused.

KEYWORDS: cybersecurity database hacking

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pic jonathan zhang

Jonathan Zhang is the founder and CEO of Threat Intelligence Platform (TIP). 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ransomware, Cybersecurity

    The Ransomware Dilemma: Is Paying Up a Good Idea?

    See More
  • Down the Toilet Not a Good Idea When Handling a White Powder on Capitol Hill

    See More
  • Good Neighbor? Good Fence? Or Bad Idea?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing