When Vendors Control Your DNS: A Hidden DMARC Security Risk

January 26, 2026

A marketing vendor managing DNS refused to remove their DMARC record on a sending subdomain, redirecting DMARC reports to third parties and blocking our visibility into that email traffic. While the root domain remains monitored, the subdomain becomes a blind spot, creating security and data exposure risks. A reminder that DNS and DMARC ownership should never be delegated without clear controls.

When Vendors Control Your DNS: A Hidden DMARC Security Risk

A 3rd party has deliberately blocked our ability to monitor DMARC reports for email sent from OUR domain.

DNS is managed by a marketing vendor, who claims this control is required for the website and ad to function correctly. This vendor is sending email traffic from a subdomain via Mailgun.

While DMARC for the root domain is configured and delivers aggregate reports to us, the vendor refuses to remove the DMARC configuration on the subdomain, stating that doing so would “break” their email setup.

As a result, DMARC data for our domain is being redirected to 3rd party providers without our authorization, while we are prevented from accessing visibility into the subdomain’s email performance, authentication results, and security posture.

This creates a data exposure risk, as hashtag#DMARC telemetry related to our domain is disclosed to external parties without consent. It also reduces our ability to protect the organization from domain abuse.

Revoking hashtag#DNS / NS delegation would disrupt the website, marketing, and rev-gen systems...

A good reminder to choose vendors carefully, as security risks often originate outside the organization.

Related posts
All posts
Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise

A scam email sent from @google.com passed SPF, DKIM, and DMARC without a compromised account. Here’s what it reveals about modern email threats.

Google.com Scam Sent via Gmail API - DMARC Passed, No Account Compromise
When Vendors Control Your DNS: A Hidden DMARC Security Risk

A real-world example of how third-party DNS control can silently block DMARC visibility, redirect domain telemetry, and introduce serious email security and data exposure risks.

When Vendors Control Your DNS: A Hidden DMARC Security Risk
2.3 million emails. One exposed API key. $10K bill.

How DMARC forensics exposed an API key leak, 2.3M unauthorized emails, and a $10K bill.

2.3 million emails. One exposed API key. $10K bill.