|
Early last July 2022, news broke out about the arrest of a CEO who allegedly sold fake Cisco networking devices. While he used e-commerce sites as sales channels, the idea that counterfeit products are also peddled through cybersquatting domains is not too far-fetched. In fact, we demonstrated this at Europol’s 13th Operation In Our Sites (IOS), along with other organizations in the cybersecurity community.
Aside from counterfeiting, cybersquatting domains can also serve as vehicles for other types of cybercrime, such as spear phishing, scams, and spamming. In line with that, WhoisXML API researchers monitored the Domain Name System (DNS) for cybersquatting domains targeting Cisco and its major competitors—Avaya, Broadcom, Juniper Networks, and Netgear. Our findings include:
A sample of the additional artifacts obtained from our analysis is available for download from our website.
We used the company names as search strings to retrieve relevant properties using Domains & Subdomains Discovery. To lessen the number of false positives, we added restrictions, such as excluding domains that contained the string “francisco” for Cisco cyber resources.
We found 2,797 cybersquatting properties added from 1 June to 8 August 2022. We then analyzed these resources using IP, WHOIS, and other DNS intelligence tools.
Before proceeding with any other analyses, we thought it’d be interesting to establish attribution for the properties. Does the targeted company own them? Based on the Bulk WHOIS Lookup results, the cybersquatting properties could hardly be attributed to the network hardware providers.
In particular, only eight domains shared the same publicly available registrant details as the official domains of the companies, and they were all owned by Cisco. About 85% of the non-publicly attributable domains actively resolved to 1,400+ unique IP addresses.
More than 60% of the properties resolved to IP addresses geolocated in the U.S., while the rest were distributed across 49 other countries. The locations didn’t differ much from the registrant countries of most of the domains. About 46% of them were registered in the U.S. as well, and the remaining domains were registered across 47 other countries.
The table below shows the top 10 countries in terms of IP geolocation and WHOIS registration, along with the percentage of properties attributed to them.
Top 10 IP Geolocations | Top 10 Registrant Countries |
---|---|
1. U.S. (60.34%) 2. Germany (6.54%) 3. Canada (4.85%) 4. U.K. (4.85%) 5. France (3.16%) 6. Ireland (2.39%) 7.Switzerland (2.21%) 8. Russia (1.94%) 9. Netherlands (1.67%) 10. China (1.32%) | 1. U.S. (45.59%) 2. Iceland (5.74%) 3. Canada (5.50%) 4. Austria (4.28%) 5. U.K. (2.75%) 6. France (1.78%) 7. Germany (0.89%) 8. China (0.89%) 9. Japan (0.65%) 10. Finland (0.49%) |
Part of our study was to find out who had authority over the properties. For the domains, that would be GoDaddy, since it is the top registrar of the cybersquatting resources, accounting for 16% of the registrations. It was followed by MarkMonitor, Namecheap, Network Solutions, Info.at Google, Amazon, PDR Ltd., 123-Reg Limited, and Wix. The rest were distributed across 154 other registrars.
Most of the cybersquatting domains in the study (19%) resolved to IP addresses belonging to Amazon. Google accounted for 10%, followed by Cloudflare, Microsoft, Fastly, OVH, Linode, Hetzner, Digital Ocean, and Wix.
More than a dozen cybersquatting resources have been reported as malicious since 8 August 2022. Among them is netgearextendersetups[.]com, which resolved to 190[.]115[.]26[.]62. Five other similar-looking cybersquatting domains also resolved to the same IP address but haven’t been flagged yet. These are:
Aside from resolving to the same IP address, these domains also shared the same registrar and nameserver. The rest of their WHOIS details were redacted, except for netgearwifiextendersetup[.]us. We retrieved a public email address that was historically tied to 17 suspicious-looking domains, according to Reverse WHOIS Search. Some seemed to mimic the login pages of router and entertainment sites. These are shown in the screenshot below.
Only time can tell if they will also be weaponized, but keeping an eye on them and other cybersquatting properties could be a good cybersecurity practice.
We began with cybersquatting properties, some of which could be benign. Still, a deep dive into the malicious ones led us to more suspicious properties that could harm users and their networks.
The suspicious properties we uncovered in this post can be used to sell fake network devices. They can also be weaponized to serve as phishing, scam, and malware distribution vectors.
If you wish to perform a similar investigation or get access to the full data behind this research, please don’t hesitate to contact us.
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global