Home / Industry

The Most Phished Brands of 2024 in the DNS Spotlight

The Zscaler ThreatLabz 2024 Phishing Report named Microsoft, OneDrive, Okta, Adobe, SharePoint, Telegram, pCloud, Facebook, DHL, WhatsApp, ANZ Banking Group, Amazon, Ebay, Instagram, Google, Sparkasse Bank, FedEx, PayU, Rakuten, and Gucci as the 20 most phished brands. They are proof that popularity comes at a steep price. In their case, phishers have been exploiting their customers’ trust to gain entry into as many enterprise networks as possible. Why? The 20 brands have millions of users worldwide.

The report, however, did not contain specifics about the phishing campaigns where the 20 aforementioned brands were abused. In a bid to shed more light, the WhoisXML API research team conducted an in-depth DNS investigation to find domains, subdomains, and IP addresses that could have figured in the threats or weaponized for similar attacks in the future.

Our study led to the discovery of:

  • 3,120 branded domains, 12 of which turned out to be malicious
  • Eight branded subdomains
  • 14 IP addresses, 11 of which turned out to be associated with various threats

Note that this post contains only a preview of our findings. The full research, including a sample of the additional artifacts obtained from our analysis are available for download from our website.

A Closer Look at the Branded Web Properties

To kick off our search for digital properties that could have figured or be weaponized in the future for phishing and other cyber attacks, we needed more information about the 20 most spoofed brands first, specifically the products’ domain names and web pages and WHOIS record details.

Our bulk WHOIS lookup for the 20 most phished brands revealed that telegram[.]org and sparkasse[.]de had redacted WHOIS records, which meant exclusion from further investigation. We would not be able to determine which telegram- and sparkasse-containing domains could be publicly attributed to Telegram and the Sparkasse Financial Group. We used the data in the following table for our query.

BRANDDOMAIN NAMEWEB PAGE ADDRESS
Microsoftmicrosoft[.]com
OneDrivemicrosoft[.]com/en-us/microsoft-365/onedrive/
Oktaokta[.]com
Adobeadobe[.]com
SharePointmicrosoft[.]com/en-us/microsoft-365/sharepoint/
Telegramtelegram[.]org
pCloudpcloud[.]com
Facebookfacebook[.]com
DHLdhl[.]com
WhatsAppwhatsapp[.]com
ANZ Banking Groupanz[.]com[.]au
Amazonamazon[.]com
Ebayebay[.]com
Instagraminstagram[.]com
Googlegoogle[.]com
Sparkasse Financial Groupsparkasse[.]de
FedExfedex[.]com
PayUpayu[.]com
Rakutenrakuten[.]com
Guccigucci[.]com

Our analysis of the remaining 18 text strings (16 connected to brands with domains and two connected to brands with specific web pages) was broken down into three parts. In the first part, we looked for domains containing the 16 remaining most phished brands that had domain names. In the second part, we searched for subdomains where the string microsoft.com, alongside onedrive or sharepoint, appeared. The third part looked at the IP resolutions of all the malicious web properties.

Inspecting the Underbelly of the Branded Domains

The next step was to look for domain names containing text strings found in those belonging to the 16 brands left on our list, namely:

  • microsoft.
  • okta.
  • adobe.
  • pcloud.
  • facebook.
  • dhl.
  • whatsapp.
  • anz.
  • amazon.
  • ebay.
  • instagram.
  • google.
  • fedex.
  • payu.
  • rakuten.
  • gucci.

Our Domains & Subdomains Discovery searches for the 16 text strings using the Domains only, Starts with, and Added since January 1, 2023 (based on the report’s coverage) turned out 3,120 branded domains.

Threat Intelligence API revealed that 12 of the 3,120 branded domains were associated with various threats. Take a look at five examples below.

MALICIOUS BRANDED DOMAINASSOCIATED THREAT TYPES
amazon[.]org[.]ggPhishing
facebook[.]com[.]brGeneric threat
fedex[.]info[.]plPhishing
google[.]siteMalware distribution
gucci[.]com[.]byAttack

Specifically, five out of 12 malicious branded domains were associated with generic threats. Three domains each were connected to phishing and malware distribution and one with an attack.

Next, we subjected the 3,120 branded domains to a bulk WHOIS lookup and found that 1,042 did not have details in their current WHOIS records. That left us 2,078 branded domains for the rest of this study.

Of the 2,078 branded domains with current WHOIS record details, 818 could be publicly attributed to the 16 brand owners while 1,260 could not.

Here’s a more in-depth breakdown of the 2,078 branded domains with current WHOIS record details by brand.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix