Home / Industry

A Fake ID Marketplace under the DNS Lens

The concept of internationalization extends from the virtual to the physical realm. Many people wish to travel or even migrate to other countries at some point in their lives. Unfortunately, that’s sometimes easier said than done given the many legal documents, including valid IDs, passports, and others required.

In the past, some wanna-be international travelers met unsavory characters in the real world to obtain fake IDs. Today, all that has become doable online. And due to the demand, many threat actors have put up their own online marketplaces.

WhoisXML API threat researcher Dancho Danchev recently uncovered an email address allegedly belonging to one such proprietor—noveltypro1@hotmail[.]com. Our cybersecurity research team trooped to the DNS to find out how extensive the operation could be.

Our indicator of compromise (IoC) expansion analysis jumping off the malicious email address led to the discovery of:

  • Nine email-connected domains
  • Seven IP addresses that played host to the email-connected domains
  • One IP-connected domain
  • 231 string-connected domains
  • 777 string-connected subdomains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

DNS Connections

To determine the extent of the fake ID proprietor’s network, we performed a WHOIS History Search for domains whose records contained the email address in their records. We uncovered nine such domains.

A bulk WHOIS lookup for the nine email-connected domains showed that:

  • Shinjiru Technology Sdn. Bhd. was the top registrar, accounting for two of the domains. Hong Kong Kouming International Limited, Hosting Concepts B.V., WEBCC, ZigZagNames.com LLC, and Gname.com Pte. Ltd. administered one domain each. The remaining two email-connected domains did not have public current registrar data.
  • While two of the email-connected domains did not have current creation dates, the remaining seven were created between 2004 and 2023.

  • A majority of the email-connected domains, four to be exact, were registered in the U.S. One was registered in Malaysia. The remaining four did not have available registrant country data.

While five of the email-connected domains were unreachable as of this writing based on screenshot lookups, three continued to host live content and one led to an error page.

Based on their content, these three sites may offer fake IDs, even passports, licenses, and diplomas, to interested buyers.

Next, we subjected the email-connected domains to DNS lookups, which revealed that they resolved to seven unique IP addresses. Threat intelligence lookups for them yielded interesting findings about five of them. Take a look at the table below.

IP ADDRESSTHREAT TYPE CLASSIFICATION
172[.]67[.]148[.]80GenericPhishing
208[.]91[.]197[.]46GenericPhishingMalwareSuspiciousC&C
172[.]67[.]132[.]236GenericPhishingMalware
104[.]21[.]29[.]28GenericPhishing
104[.]21[.]13[.]182GenericPhishingMalware

A bulk IP geolocation lookup for the seven IP addresses showed that:

  • They were spread across three countries led by the U.S., which accounted for five IP addresses. One IP address each was geolocated in China and Ukraine.
  • The top Internet service provider (ISP) was Cloudflare, Inc., which accounted for four IP addresses. Virtual Systems LLC; Shenzhen Jizhan Technology Co. Ltd.; and Confluence Networks, Inc. each administered one of the three remaining IP addresses.

We then performed reverse IP lookups on the seven IP addresses and found that two of them were seemingly dedicated. They hosted three domains. After we removed duplicates and the email-connected domains, we were left with one IP-connected domain—handyman-joes[.]com.

Further scrutiny of the email-connected domains allowed us to identify six text strings that are likely to appear in fake ID-related web properties. We used them as Domains & Subdomains Discovery search terms to uncover other domains and subdomains created or added since 1 January 2023. Take a look at the detailed list in the table below. Note that the number of domains indicated still include those that have already been identified as email- and IP-connected.

TEXT STRINGNUMBER OF STRING-CONNECTED DOMAINSNUMBER OF STRING-CONNECTED SUBDOMAINS
cloneid311
fakeid195685
fakeidentity60
idclone1046
identityclone01
idfake1734

After filtering the string-connected domain and subdomain lists to exclude duplicates and those that have already been tagged as either email- or IP-connected, we were left with 231 and 777 string-connected domains and subdomains, respectively.

A total of 522 string-connected web properties remained accessible to date—152 domains and 370 subdomains.

Based on their screenshots, 42 of the 152 string-connected domains did host sites that seemingly sold fake IDs or promoted them. Take a look at four examples below.

In addition, 24 of the string-connected subdomains also hosted pages that were seemingly related to the proliferation of fake ID usage. Certain of them also appear to fall under free blogging platform domains. Take a look at four examples below.


Our in-depth analysis of the sole email address belonging to a fake ID peddler led to the discovery of 17 web properties—nine email-connected domains, seven IP addresses, and one IP-connected domain—that could be part of the same malicious infrastructure. We also found 522 domains and subdomains that could belong to fellow fake ID sellers.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

BLACK FRIDAY DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign