|
A typosquatting campaign targeting U.S. Bancorp was uncovered a few weeks ago, potentially posing a threat to the financial institution and its customers. As of this writing, four domains and their IP resolutions were identified as indicators of compromise (IoCs).
As part of a continuous effort to provide members of the security community with relevant artifacts, we sought to determine if the recent campaign is limited to targeting U.S. Bancorp or involves other financial institutions.
The key findings, which we’ll dive deeper into later on, include:
The complete list of suspicious and malicious domains identified in this post is available for download on our website.
We compiled lists of domains containing the string “bank” that were registered between 3 October and 3 November 2021. We found more than 10,000 NRDs, including:
We also found more than 10,000 recently expired domains for the same period, including:
We subjected the list of 10,000+ NRDs to a bulk WHOIS lookup and found that 180 shared the creation date of the four domains targeting U.S. Bancorp. Some of them include:
Our bulk WHOIS lookup findings, however, did not show definitive proof of connections between the original publicized IoCs and the 180 domains containing the string “bank.”
A bulk DNS lookup revealed that 140 of the 10,000 domains shared IP addresses with the U.S. Bancorp IoCs IBM identified. Examples include:
Using Threat Intelligence Platform (TIP), a subsequent bulk malware check of the 10,000 domains showed that 299 were dubbed “dangerous” on various threat databases. Examples include:
secure-bankofamerica-ii[.]com ## Findings about the Recently Expired Domains
Subjecting the list of recently expired domains to a bulk WHOIS lookup revealed that none of them shared registrant details, which could mean they aren’t related to the threat identified by IBM. The same is true based on our bulk DNS lookup results, which showed that none of the recently expired domains shared IP hosts with the IoCs.
A bulk malware check on TIP showed that 131 of the 10,000+ recently expired domains were tagged “dangerous.” Examples include:
To check if certain status codes assigned to domains could be indicative of malicious activity, we collated domains containing the string “bank” and created or dropped between 3 October and 3 November 2021. The status breakdown of our collected domain sample was as follows:
Note that each domain can have several statuses at the same time. Bulk WHOIS and DNS lookups showed that none of the NRDs and recently expired domains had ties to the ongoing campaign. None of them shared IP addresses with the four original IoCs either.
A bulk malware check of the 2,120 domains (with the four status codes minus duplicates), however, revealed that 79 of the NRDs and recently expired domains were dubbed “dangerous.” For more information on the various status codes assigned to domains and their meanings, visit our WHOIS Glossary.
Based on the analysis conducted in this post, the use of look-alike domains appears to remain a common way to impersonate banks, as in the case of U.S. Bancorp, and the banking industry as a whole.
Are you interested in doing similar investigations? Do not hesitate to contact us to explore potential research collaborations.
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix