Home / Industry

Fishing for QR Code Phishing Traces in the DNS

Threat actors have been seen yet again abusing a technology meant to make things easy for all of us—QR codes—in one of the most commonly utilized cybercriminal activities—phishing. The rise in QR code phishing isn’t surprising given that according to several studies, as much as 86% of the entire global population use their mobile phones for all kinds of transactions, including financial ones.

The large potential victim pool and the open-source nature of QR codes could be the rationale behind the technology’s usage in phishing. It also doesn’t help that determining the validity of QR codes is much harder than doing so for hyperlinks.

Trustwave researchers recently noted this trend and published the results of their in-depth study on ongoing QR code phishing scams, including 18 URLs that they identified as indicators of compromise (IoCs). In an effort to help curb similar attacks in the future, the WhoisXML API research team trooped to the DNS to look for as many unreported potentially connected artifacts as possible. Our deep dive led to the discovery of:

  • 10,000 domains with the same registrant name as one of the IoCs in their WHOIS records, 10 of which turned out to be malicious based on a bulk malware check
  • 10 unique IP addresses to which the domains from the extracted 18 URLs identified as IoCs resolved
  • 114 domains that shared the seemingly dedicated IP addresses that played host to the extracted domains, 26 of which turned out to be malicious based on a bulk malware check
  • 10,045 domains that contained text strings found among some of the extracted domains, four of which turned out to be malicious based on a bulk malware check
  • 30 domains with the exact string qr.codes akin to one of the domains extracted from the URLs identified as IoCs

A sample of the additional artifacts obtained from our analysis is available for download from our website.

What the DNS Revealed about the IoCs

To gather as much information as possible about the threat actors’ infrastructure, we first subjected the IoCs to a bulk WHOIS lookup. We found that:

  • Fifteen of the 18 domains had some publicly available WHOIS information although most details were heavily redacted. Only one record had the registrant organization field filled in.
  • The 15 domains with retrievable WHOIS records were spread across eight registrars topped by GoDaddy.com LLC, Google, and Namecheap, Inc., accounting for three IoCs each.
  • All of the 15 IoCs were newly registered domains (NRDs).
  • The registrant of the domain qhsbobfv[.]top was publicly visible but written in Chinese.
  • The 15 domains were registered in six countries led by Canada and the U.S., accounting for five IoCs each.

Connections We Found in the DNS

Our bulk WHOIS lookup for the 18 domains extracted from the URLs identified as IoCs uncovered an unredacted registrant name. A reverse WHOIS search revealed that the name appeared in the historical WHOIS records of at least 10,000 other domains. A bulk malware check for them showed that 10 were already being detected as malicious. To date, only one remained accessible although it led to a blank page.

To dig for connected artifacts which published reports may not contain, we then subjected the 18 extracted domains to DNS lookups. Seven of them resolved to 10 unique IP addresses. Reverse IP lookups for the IP resolutions revealed that two of them were seemingly dedicated. Altogether, the dedicated IP addresses hosted 114 domains that weren’t part of the IoC list, 26 of which are already being detected as malicious based on a bulk malware check.

Screenshot lookups for the 26 malicious IP-connected domains showed that 24 still hosted live content at the time of writing. Take a look at three examples shown below.

Screenshot of agenkebab[.]com
Screenshot of customsfee-supporthub[.]com
Screenshot of franchisekebab[.]com

Based on screenshots of three pages hosted on the domains identified as IoCs, the QR code phishing campaign threat actors seemed to use web properties whose content could be mistaken for legitimate business pages. Three examples are shown below.

Screenshot of the page hosted on the IoC aircourier-company[.]com
Screenshot of the page hosted on the IoC viajalejos[.]net
Screenshot of the page hosted on the IoC lockvvoodgroup[.]com

What was more interesting, however, was that the screenshots of the pages hosted on the IoC lockvvoodgroup[.]com and the newly discovered malicious IP-connected domain customsfee-supporthub[.]com led to web pages with the same content.

The other business pages seem to focus on products and services that potential victims may typically look for on any given day, such as sites that offer food delivery, courier, and travel services, hence upping the chances that they wouldn’t think twice about their content.

Strings found among six of the extracted domains listed below also appeared in 10,045 other domains based on Domains & Subdomains Discovery searches.

  • 16092022.
  • viajalejos.
  • qrserver.
  • lockvvoodgroup.
  • isirumah.
  • qr.

A bulk malware check for the 10,045 string-connected domains revealed that four were being detected as malicious. One continued to host live content at the time of writing.

Screenshot of qr[.]st

Our list expansion analysis of the domains we extracted from 18 URLs identified as QR code phishing IoCs uncovered more than 20,000 possibly connected artifacts. It also brought to light the IP addresses the threat actors may have used during their attacks, apart from more malicious domains that could be part of their or other threat actors’ cybercriminal infrastructure.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC