|
The public attention COVID-19 got was truly reflected in the Domain Name System (DNS). And Monkeypox seems to be following the trail the pandemic blazed, though to a smaller extent, as threat actors seem to be using it as the latest phishing lure. How has this new virus been affecting domain registration?
We took a closer look at the DNS space and found:
A sample of the additional artifacts obtained from our analysis is available for download from our website.
Monkeypox made headlines in the U.S. when the Centers for Disease Control and Prevention (CDC) first received infection reports in May this year. To date, the CDC has 7,510 reported cases.
Given the rising volume of infections worldwide (30,189 cases at present), the World Health Organization (WHO) has declared monkeypox a public health emergency on 23 July 2022.
Monkeypox may not just affect more people’s health, it could also go viral online and present digital risks.
Monkeypox is seemingly following COVID-19’s digital footsteps in that it’s impacting the DNS, albeit at a smaller scale. The virus has been used as a phishing lure in at least one campaign with a single domain (rawshan[.]com) identified as an indicator of compromise (IoC).
A WHOIS lookup revealed that it’s a pretty old domain, created way back in November 2003—possibly hinting at a tactic to evade automatic blocking for being a newly registered domain (NRD).
A DNS lookup showed it resolved to two unique IP addresses—172[.]67[.]134[.]10 and 104[.]21[.]5[.]242. While they aren’t malicious, they are shared hosts. At least 600 domains shared them, in fact. One of the web properties—almandoz-tobago[.]com—was deemed “malicious” by a bulk Threat Intelligence Platform (TIP) malware check.
To see if monkeypox is gaining traction in terms of domain registration, we used “monkeypox” as a Domains & Subdomains Discovery search term. That unveiled 728 domains and 75 subdomains, six of which were deemed “malicious.” These are:
A closer scrutiny of the web properties allowed us to map the domain and subdomain registration trends.
The domain and subdomain registration volumes peaked in May 2022, the same time the first case was reported to the CDC. We’ve often said trends followed current events, and this case proves just that.
An even closer look showed that given the increasing number of monkeypox infections in the U.S., it’s quite normal for people to troop online to get information on the virus itself, testing, and cures. That was reflected as well since most of the “monkeypox”-containing domains and subdomains also had the strings led by “test,” “virus,” and “info.”
A lot of the web properties we found are currently up for sale, which phishers might find enticing to host fake Monkeypox-related sites.
While only a few of the additional artifacts we found are considered malicious so far, a few of them could be compromised to serve as malware hosts. Organizations looking to ward off potential phishing campaigns should at the very least monitor potentially related artifacts and block access to the malicious ones.
If you wish to perform a similar investigation or get access to the full data behind this research, please don’t hesitate to contact us.
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byIPv4.Global