NordVPN Promotion

Home / Industry

Phisher Abusing .com TLD?

Protect your privacy:  Get NordVPN  [ Deal: 73% off 2-year plans + 3 extra months ]
10 facts about NordVPN that aren't commonly known
  • Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
  • RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
  • Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
  • NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
  • Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.

Phishing campaigns almost always require a massive volume of domains in order to succeed. Phishers, after all, need to have readily weaponizable vectors at their disposal in case the ones they’re currently employing get detected and consequently blocked.

The Threat Intelligence Platform (TIP) research team recently uncovered an email address that belonged to the operator of an ongoing phishing operation that has seemingly been amassing an arsenal of .com domains. Using this address as a jump-off point, we sought to uncover all other potentially connected artifacts strewn all over the DNS. Our in-depth investigation into the threat found:

  • 507 domains registered using the email address identified as an indicator of compromise (IoC) in the past decade or so, 60 of which turned out to be malicious based on a bulk malware check
  • 99 IP addresses to which the email-connected domains resolved, 40 of which turned out to be malicious based on malware checks
  • 1,721 domains that shared the possibly dedicated hosts of the email-connected domains, 19 of which turned out to be malicious based on a bulk malware check

A sample of the additional artifacts obtained from our analysis is available for download from our website.

A Study of the Email-Connected Domains

We began our DNS deep dive by looking for domains that were registered using the email address identified as an IoC in the past 10 years or so. That led to the discovery of 507 email-connected domains. A TIP bulk malware check for them revealed that 60 of them were found malicious.

The WHOIS records of the 507 email-connected domains revealed these findings:

  • Registrars: A majority of the domains, 417 to be exact, didn’t have current retrievable WHOIS information at the time of writing. But for the 90 domains with available information, the top 3 registrars were GoDaddy (38 domains), Namecheap (6 domains), and TurnCommerce (5 domains). The remaining 41 domains were registered with 30 other registrars.
  • Creation dates: The 90 email-connected domains with current WHOIS records were created between 2013 and 2023. The highest number, 20 domains to be exact, were created in 2022.

  • Registrant countries: Only 81 of the 90 email-connected domains had the registrant country field filled, with the top 3 registrant countries being the U.S. (54 domains), China (6 domains), and Iceland (5 domains). The remaining 16 domains were registered in nine other countries.

An Analysis of the IP-Connected Domains

To uncover other potential threat vectors that may have already been used in or could be weaponized for attacks, we then scoured the DNS records of the email-connected domains for more information.

A closer look at the domains’ DNS records revealed that only 144 of the domains resolve to IP addresses as of this writing. Take a look at our findings below.

  • Removing the duplicates left us with 99 unique IP addresses. TIP malware checks showed that 40 of them were malicious.
  • Seven of the malicious IP addresses have been reported on AbuseIPDB between 26 and 42 times as of this writing as detailed in the following table.

    Malicious IP AddressNumber of Times Reported on AbuseIPDB
    18[.]119[.]154[.]6626
    3[.]140[.]13[.]18834
    3[.]94[.]41[.]16727
    52[.]86[.]6[.]11326
    52[.]71[.]57[.]18442
    3[.]19[.]116[.]19527
    3[.]130[.]253[.]2333
  • The top 3 countries where the IP addresses pointed to were the U.S. (40 IP addresses), Japan (19 IP addresses), and China (17 IP addresses). The 23 remaining IP addresses were geolocated in eight other countries.

  • The 98 IP addresses with available Internet service provider (ISP) information were distributed among 35 ISPs led by Amazon (19 IP addresses), RackIP Consultancy (17 IP addresses), and Microsoft (8 IP addresses).

Further scrutiny of the IP records allowed us to determine that while nine didn’t have connected domains, 40 of the IP addresses were possibly dedicated, playing host to a total of 1,721 domains, 19 of which turned out to be malicious based on a bulk TIP malware check.

A Closer Look at the Ties That Bound the Artifacts

Further scrutiny of the 79 malicious domains (60 email- and 19 IP-connected domains) led to the following findings:

  • The page hosted on the malicious email-connected domain bosll[.]com seemed to be mimicking a Windows Server page even if we couldn’t publicly attribute it to the product owner Microsoft based on a WHOIS record data comparison.
    Screenshot of bosll[.]com
  • A total of 34 email- and IP-connected malicious domains remained accessible as of this writing—22 led to live pages, eight were parked, and four led to error or warning pages. Many of those with live content looked like gambling sites, a few examples of which are shown below.

    Screenshot of d6891[.]com
    Screenshot of h9615[.]com
    Screenshot of kjfdc[.]com

    Is the Phisher Abusing .com?

    Earlier, we posited that the operators of this particular phishing campaign could be amassing a portfolio largely made up of .com domains. Our analysis of 2,228 domains in total (email- and IP-connected) revealed that a majority, 2,022 or 91%, did indeed sport .com as top-level domain (TLD) extension. The remaining 205 domains sported 35 other TLD extensions.


    Our in-depth investigation of the phishing operation allowed us to find 2,327 potentially connected domains and IP addresses from a single email address identified as an IoC. And, as we originally posited, this particular threat group had an arsenal of at least 2,022 .com domains at their disposal.

    If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

    Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By Threat Intelligence Platform (TIP), Enterprise-Grade Threat Intelligence APIs, Tools, and Services

Threat Intelligence Platform (TIP) offers easy to use threat intelligence tools, services, and APIs to get detailed information about hosts and the infrastructure behind them. Gathering data from different providers, utilizing our substantial internal databases (compiled for 10+ years), and also real-time host configuration analysis, our threat intelligence solutions provide an in-depth look at target hosts and are an essential addition to any threat detection toolkit.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

NordVPN Promotion