Home / Industry

Searching for Smishing Triad DNS Traces

Given the ubiquity of mobile phone usage, you’d think we’d all know by now how to tell legitimate from scammy text messages. Then again, cybercriminals are always on top of their game—learning how the latest technologies work and finding ways to abuse them.

Take phishing as an example. It has gone on to extend its reach far beyond users’ computers at home and in the office to the mini computers they carry no matter where they go—their mobile phones. It’s only to be expected, therefore, for smishing—Short Message Service (SMS)-based phishing—to gain popularity.

The Smishing Triad, discovered by Resecurity researchers, that plagued users all over Europe and Asia are now trailing their sights on U.S. citizens. They were most recently seen sending potential victims parcel delivery failure text messages supposedly from USPS. Users who click the embedded link and log in to the supposed USPS page are at risk of having their personal data stolen.

Resecurity published 27 indicators of compromise (IoCs) related to the ongoing campaign—two email addresses and 25 domains. The WhoisXML API researchers expanded this list through a DNS deep dive and found:

  • 9 IP addresses to which the domains resolved, two of which are already classified as malicious based on malware checks
  • 124 domains containing strings found among the IoCs, 34 of which are already considered malicious based on a bulk malware check
  • 2,395 domains containing usps registered between 1 August and 13 September 2023, 595 of which are already detected as malicious based on a bulk malware check

A sample of the additional artifacts obtained from our analysis is available for download from our website.

IoC Facts

We began our in-depth investigation by taking a closer look at the IoCs.

A bulk WHOIS lookup for the 25 domains identified revealed that:

  • Close to 90% of the domains were registered with NameSilo LLC between 10 April and 11 August 2023.
  • Nineteen of the registrants redacted their names.
  • Twenty of the registrants procured privacy protection services from PrivacyGuardian.org LLC.
  • Twenty-one of the IoCs indicated the U.S. as their registrant country.

DNS Connections

We began our IoC list expansion analysis with DNS lookups for the 25 domains. We found that only 10 of them had active IP resolutions. Collectively, they resolved to 19 unique IP addresses, two of which—104[.]21[.]29[.]74 and 91[.]195[.]240[.]123—were already being detected as malicious based on malware checks.

A bulk IP geolocation lookup for the 19 IP addresses revealed that 95% originated from the U.S. and were under the purview of Cloudflare, Inc. The remaining IoC, geolocated in Germany, was administered by SEDO GmbH.

To hunt for potentially connected domains, we ran reverse IP lookups for the 19 IP addresses and found that they all appeared to be shared hosts.

Further scrutiny of the 25 domains identified as IoCs allowed us to identify six common strings, namely:

  • wangduoyu.
  • ususnb.
  • ususgs.
  • uspsjh.
  • uspoky.
  • poczta-polska.

According to our Domains & Subdomains Discovery searches, the strings appeared in 124 other domains, as much as 27% of which may have already figured in malicious campaigns. The artifacts containing the strings wangduoyu. and poczta-polska. could have already been weaponized in attacks targeting users in Asia and Poland, respectively. Poczta Polska is, after all, Poland’s state postal administration. Those containing variants of usps, meanwhile, could be used for U.S.-based attacks, with the attackers possibly impersonating the U.S. Postal Service.

As a final step to find other artifacts possibly connected to the U.S. attacks, we looked for domains containing usps. We found 2,395 domains registered between 1 August and 13 September 2023. None of them were publicly attributable to the U.S. Postal Service based on their registrant email addresses.

It’s also interesting to note that 595 of the usps-containing domains were already being detected by various malware engines as malicious. Of these, 101 remained accessible according to screenshot lookups although 15 malicious domains proved noteworthy since they mimicked not just the U.S. Postal Service’s domain name but also its content.

Here’s a side-by-side comparison of the official USPS website and a sample fake one.

It’s also worth noting that 12 of the malicious domains hosting supposed USPS pages looked very similar. They all began with usps and one randomly chosen letter and used the .com TLD extension.


Our DNS deep dive into the Smishing Triad unveiled more than 2,500 potentially connected artifacts. Note, however, that the USPS look-alike domains and websites may not necessarily be part of the group’s infrastructure but when accessed could definitely put users at risk since none of them could be publicly attributed to the company.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign