|
Many countries worldwide celebrate Safer Internet Day every February 8. And while most parents always strive to do their best to keep their children safe while browsing the Web, threat actors still manage to abuse their good intentions. How?
Many individuals and companies share content that could hopefully teach parents how to browse and interact with others on the Internet safely. But we found that many of the sites touting safer Internet best practices shouldn’t automatically be trusted. Our analysis, in fact, revealed:
As part of our ongoing effort to enable cybersecurity analysts and researchers to further their studies, we collated all pertinent data and made it available to anyone interested. You may download the related threat research materials here.
We used three string combinations to gather the data for our analysis, namely domains and subdomains that contain these words:
Domains & Subdomains Discovery provided us with more than 7,100 web properties (5,984 domains and 1,201 subdomains). We then ran these pages through bulk malware checks via the Threat Intelligence Platform (TIP) and found that almost 130 of them were dubbed “dangerous” by various malware engines. See the table below for examples.
Malicious Domains | Malicious Subdomains |
---|---|
ausafety[.]digital digitalfamilysafety[.]com digitalwebsafety[.]online online-safety[.]ws mobilesafety[.]online websafetykd2[.]online websafetyscan[.]online onlinesafetyhelp[.]com onlinecybersafety[.]net checkingsafety[.]online | klanten-online-safety[.]109-71-253-24[.]plesk[.]page |
As usual, we made it a point to expand the list of artifacts related to this threat. We checked the location of the malicious domains and subdomains and found that these resolved to nine unique IP addresses, namely:
Apart from refraining from accessing the malicious domains and subdomains we found earlier, users would also do very well from steering clear of any sites hosted on 99[.]83[.]154[.]118, which according to a TIP malware check, is malicious.
Interestingly, while 128[.]199[.]84[.]63 wasn’t deemed malicious by any malware engine, one of the domains (i.e., emulationsafety[.]online) that it plays host to is unsafe to access. Our analysis was limited to five connected domains per IP host so the other seven IP address resolutions could pose the same risk.
A WHOIS data review for the nearly 6,000 domains also showed that 97 were newly registered. Their owners could be riding on the popularity of sites that offer Internet safety best practices. The list of newly registered domains (NRDs) include malicious properties, namely:
The continued registration of domains with the word “safety” could be due to the fact that they do work as an effective lure to get users to visit the hosted sites. That said, we’re bound to see more domains created with the strings we identified in the future.
Not all malicious web properties may have been designed that way. Some may have been compromised because they were insufficiently secured. Secure Sockets Layer (SSL) and mail exchanger (MX) record misconfigurations could lead to such cases. We looked more closely at the malicious domains and subdomains using TIP to prove that and found that apart from hosting malware, they also sported various configuration errors as shown by the table below.
IP | Web | SSL | WHOIS | MX | NS | |
---|---|---|---|---|---|---|
Number of malicious web properties | 0 | 2 | 9 | 42 | 3 | 8 |
TIP checks domains and IP addresses for possible errors or misconfigurations. Take onlinedepartmentwfbanksafetyteam[.]club, for instance. It has three outgoing links based on our TIP web analysis, one of them could be pointing to a malicious page or file. It also lacked a Secure Sockets Layer (SSL) certificate, making the site very vulnerable. Its WHOIS record has been redacted as well. Its MX records could have also been modified by unauthorized users, given that it doesn’t have Domain-Based Message Authentication, Reporting, and Conformance (DMARC) set up. Finally, the domain uses stealth nameservers, which could be a threat actor tactic to evade detection. All these misconfigurations could make the domain ripe for attacker picking.
If there’s a lesson that users can learn from our analysis, it’s that they shouldn’t trust a site just because its name touts safety. When browsing the Web, it’s always prudent to think twice about the websites you wish to access. As shown here, several pages that suggest keeping people safe from threats are malware hosts.
If you wish to perform a similar investigation, please don’t hesitate to contact us on threatintelligenceplatform.com. We’re always on the lookout for potential research collaborations.
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byIPv4.Global