Early last July 2022, news broke out about the arrest of a CEO who allegedly sold fake Cisco networking devices. While he used e-commerce sites as sales channels, the idea that counterfeit products are also peddled through cybersquatting domains is not too far-fetched. In fact, we demonstrated this at Europol’s 13th Operation In Our Sites (IOS), along with other organizations in the cybersecurity community.
Aside from counterfeiting, cybersquatting domains can also serve as vehicles for other types of cybercrime, such as spear phishing, scams, and spamming. In line with that, WhoisXML API researchers monitored the Domain Name System (DNS) for cybersquatting domains targeting Cisco and its major competitors—Avaya, Broadcom, Juniper Networks, and Netgear. Our findings include:
- 2,700+ cybersquatting domains and subdomains targeting the five network hardware providers were added from 1 June to 8 August 2022
- More than 99% of the properties couldn’t be publicly attributed to the legitimate companies
- About 86% of the properties actively resolved to IP addresses
- Despite being relatively new, more than a dozen properties have already been flagged as malicious
A sample of the additional artifacts obtained from our analysis is available for download from our website.
Dissecting the Cybersquatting Properties Targeting Network Hardware Provide
We used the company names as search strings to retrieve relevant properties using Domains & Subdomains Discovery. To lessen the number of false positives, we added restrictions, such as excluding domains that contained the string “francisco” for Cisco cyber resources.
We found 2,797 cybersquatting properties added from 1 June to 8 August 2022. We then analyzed these resources using IP, WHOIS, and other DNS intelligence tools.
Who Owns the Properties?
Before proceeding with any other analyses, we thought it’d be interesting to establish attribution for the properties. Does the targeted company own them? Based on the Bulk WHOIS Lookup results, the cybersquatting properties could hardly be attributed to the network hardware providers.
In particular, only eight domains shared the same publicly available registrant details as the official domains of the companies, and they were all owned by Cisco. About 85% of the non-publicly attributable domains actively resolved to 1,400+ unique IP addresses.
Where Are the Cybersquatting Resources Located?
More than 60% of the properties resolved to IP addresses geolocated in the U.S., while the rest were distributed across 49 other countries. The locations didn’t differ much from the registrant countries of most of the domains. About 46% of them were registered in the U.S. as well, and the remaining domains were registered across 47 other countries.
The table below shows the top 10 countries in terms of IP geolocation and WHOIS registration, along with the percentage of properties attributed to them.
Top 10 IP Geolocations | Top 10 Registrant Countries |
---|---|
1. U.S. (60.34%) 2. Germany (6.54%) 3. Canada (4.85%) 4. U.K. (4.85%) 5. France (3.16%) 6. Ireland (2.39%) 7.Switzerland (2.21%) 8. Russia (1.94%) 9. Netherlands (1.67%) 10. China (1.32%) |
1. U.S. (45.59%) 2. Iceland (5.74%) 3. Canada (5.50%) 4. Austria (4.28%) 5. U.K. (2.75%) 6. France (1.78%) 7. Germany (0.89%) 8. China (0.89%) 9. Japan (0.65%) 10. Finland (0.49%) |
What Organizations Oversee the Properties?
Part of our study was to find out who had authority over the properties. For the domains, that would be GoDaddy, since it is the top registrar of the cybersquatting resources, accounting for 16% of the registrations. It was followed by MarkMonitor, Namecheap, Network Solutions, Info.at Google, Amazon, PDR Ltd., 123-Reg Limited, and Wix. The rest were distributed across 154 other registrars.
Most of the cybersquatting domains in the study (19%) resolved to IP addresses belonging to Amazon. Google accounted for 10%, followed by Cloudflare, Microsoft, Fastly, OVH, Linode, Hetzner, Digital Ocean, and Wix.
Malicious Properties Ale
More than a dozen cybersquatting resources have been reported as malicious since 8 August 2022. Among them is netgearextendersetups[.]com, which resolved to 190[.]115[.]26[.]62. Five other similar-looking cybersquatting domains also resolved to the same IP address but haven’t been flagged yet. These are:
- netgearwifiextendersetupen[.]com
- netgearextendersetupwifi[.]com
- netgearextender-setup[.]com
- netgearwifiextendersetup[.]us
- netgearwifiextendersetupgo[.]com
Aside from resolving to the same IP address, these domains also shared the same registrar and nameserver. The rest of their WHOIS details were redacted, except for netgearwifiextendersetup[.]us. We retrieved a public email address that was historically tied to 17 suspicious-looking domains, according to Reverse WHOIS Search. Some seemed to mimic the login pages of router and entertainment sites. These are shown in the screenshot below.
Only time can tell if they will also be weaponized, but keeping an eye on them and other cybersquatting properties could be a good cybersecurity practice.
We began with cybersquatting properties, some of which could be benign. Still, a deep dive into the malicious ones led us to more suspicious properties that could harm users and their networks.
The suspicious properties we uncovered in this post can be used to sell fake network devices. They can also be weaponized to serve as phishing, scam, and malware distribution vectors.
If you wish to perform a similar investigation or get access to the full data behind this research, please don’t hesitate to contact us.
"network" - Google News
September 04, 2022 at 04:11AM
https://ift.tt/CKsp6Ib
From Counterfeiting to Phishing: Cybersquatting Properties Target Network Device Makers - CircleID
"network" - Google News
https://ift.tt/gAvZqk6
Shoes Man Tutorial
Pos News Update
Meme Update
Korean Entertainment News
Japan News Update
No comments:
Post a Comment