|
Operation Dream Job, a malicious group first seen in 2020, involves threat actors spoofing job hunting sites to lure people. It resurfaced in February 2022, this time exploiting a zero-day vulnerability in Google Chrome more than a month before the flaw was detected and a patch was made available.
The Google Threat Analysis Group (TAG) released more details about the threat, including some indicators of compromise (IoCs), such as disneycareers[.]net, find-dreamjob[.]com, indeedus[.]org, varietyjob[.]com, and ziprecruiters[.]org. Building on these IoCs, WhoisXML API researchers uncovered and analyzed more than 16,000 job-related domain names added since 1 January 2022, some of which may hint at new Operation Dream Job activities.
Among our findings are:
You may download a sample of the data related to possible Operation Dream Job domains from our website.
The Operation Dream Job IoCs were all registered with Namecheap and used the privacy protection service Withheld for Privacy. Taking these into account, along with the nameservers used by four of the domain IoCs (dns1[.]registrar-servers[.]com and dns2[.]registrar-servers[.]com) and their registrant country (Iceland), we found 544 connected domains that could be part of the Operation Dream Job infrastructure.
We detailed how the domains in this study were distributed across registrars and registrant countries below.
The domain registrars were widely dispersed, with about one-third of the domains registered under GoDaddy, while the rest were distributed across 418 registrars. The chart below shows the top 10 domain registrars.
The registrant countries of the domains were also varied, spread across 105 unique countries. Leading the list is the U.S., followed by Canada, Iceland, and Japan.
Most of the domains used privacy redaction services so their registrant countries could pertain to where the providers are located. While this information can’t pinpoint the origin of the threat, it can give insights that will aid in the takedown of malicious properties.
While most of the domains were generic job-hunting domains, hundreds seem to imitate some of the most visited employment websites, such as Glassdoor, Indeed, LinkedIn, and Zip Recruit. Out of the 710 look-alike domains, only five could be publicly attributed to legitimate companies.
The table below shows some examples of the domains we found for each spoofed website.
Job-Hunting Website | Examples of Possible Cybersquatting Domains |
---|---|
Glassdoor (glassdoor[.]com) | financemanagerglassdoor[.]com glassdoor[.]com[.]pl glassdooruk[.]com |
Indeed (indeed[.]com) | indeed-bio[.]com indeeduae[.]com indeedjobs[.]online |
LinkedIn (linkedin[.]com) | secretlinkedin[.]ca linkedin2[.]tech linkedini[.]com |
Zip Recruiter (ziprecruiter[.]com) | ziprecruiters[.]org ziprecruiter[.]vegas zipperrecruiter[.]com |
Malicious Domains Alert
Several domains have already been flagged as malicious. Below are some examples.
meridianbioscience[.]careers careercruising[.]co ewcareer[.]co[.]uk tnet-chibacareer[.]com portfoliocareerplus[.]com | masterrecruitment[.]live pinchhitterjapanrecruit[.]com theboutiquerecruiter[.]com recruiting-hamburg[.]com moderators-recruitment[.]com | careers-stevemadden[.]com careersatvalentic[.]com lmcocareer[.]org stoodcareer[.]com goprocareer[.]com |
We took a closer look at the domains that look like legitimate employment websites by running them on Screenshot API. While many were parked, some domains may be run by individuals or entities that offer career guidance.
However, several domains offered adult services and content, and quite a few hosted content very similar to the spoofed sites. Below are some examples.
Website screenshots of indeedjobsukuae[.]com and indeedsjob[.]com
Website screenshots of afghan-linkedin[.]com and habeshalinkedin[.]com
Website screenshots of googziprecruiter[.]com and zipperrecruiter[.]com
Previous Operation Dream Job attacks showed that the threat group used employment-related cyber properties. Tracking their malicious activities entails looking into the domains they can potentially use, which can be any of the 16,000+ web properties we uncovered in this study.
While the volume can be a lot to analyze and are possibly prone to false positives, there are ways to narrow down the list of potential threats. Examining WHOIS registration and DNS connections, consulting malware detection engines, and looking at the actual content of the domain are just a few threat analysis methods.
If you are a threat researcher or cybersecurity professional interested in the job-related domains presented in this study, please contact us to learn more about our cyber threat intelligence sources and possible research collaboration.
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byIPv4.Global