In today's digital landscape, cybercriminals are constantly devising new and innovative ways to infiltrate and compromise corporate systems. One such tactic is called typosquatting: the registration of domains that closely resemble a real organization in order to trick users into visiting a fraudulent website. Before any damage could be done, Cado Security recently discovered a domain that bore a striking resemblance to the Cado corporate domain during a routine check. In this blog, we will discuss how this domain was identified, and the steps taken following discovery.
Monitoring for spoofed domains is a function that helps a threat intel team detect malicious actors preparing their infrastructure for their campaigns. This early detection can prevent potential attacks and protect an organization's reputation and assets from harm.
At Cado Security, this issue is proactively addressed using a tool called dnstwist - a powerful domain generation and lookup tool that helps identify domains that could be used as part of phishing attacks. For example, using the corporate domain, cadosecurity.com, dnstwist generated nearly 9,000 permutations of the Cado domain and attempted DNS resolutions of them.
During a routine check, Cado discovered that just three days prior, a domain had been registered that contained a character substitution similar to what is seen for typosquatting attacks, highlighting that a potential threat was emerging.
Typosquatting attacks are typically done by deliberately including typos, numbers, or symbols in the domain name that a user might accidentally type or with a quick glance might consider to be legitimate. This might involve adding an extra character, such as "Cadosecurityy.com," or replacing a letter with a similar-looking number or symbol, like "Cado5ecurity.com" or "Cad0security.com" (using a zero instead of the letter 'O'). Another variation of typosquatting is the homoglyph or homograph attack, which uses characters (or glyphs) from other scripts that are very visually similar to register domains that may fool a user. For example, using Cyrillic characters mixed with Latin characters, an attacker might create a domain like "Сadosecurity.com," where the 'C' is replaced with its Cyrillic counterpart, which looks almost identical.
Once this domain was identified, it was quickly discovered that connections to the malicious domain were being redirected to Cado’s legitimate domain. This redirection indicates that the threat actor behind this activity was likely intending to imitate the domain, potentially as part of a future phishing attack.
Upon further investigation, Cado found that this malicious domain was registered through Apiname and resolved to IP address 94[.]154[.]35[.]15. Open Source Intelligence analysis revealed that not only was the domain being mimicked, but also several other tech companies' domains have been targeted in a similar fashion. This suggests that it was created as part of a broader campaign to target a large number brands. Where possible, the affected companies were notified prior to this blog being released.
The threat actor also created an X (formally Twitter) account as Cado with the typo’d domain mimicking our own X account and in one instance, they had taken it as far as purchasing a Gold Checkmark, adding followers, and following people related to Cado, in order to create a sense of authenticity.
As seen with the other tech related companies that were also victims of the same domain registration typo activity, Cado found the threat actor had also created X accounts for some of those companies as well.
When Cado identified that the malicious domain was redirecting to its website, the following proactive actions were taken:
Where possible the organizations included below have all been alerted regarding these fraudulent domains.
URLs |
biaizetech[.]com |
cadosecurlty[.]com |
changeliy[.]com |
ciickup[.]com |
elliptlc[.]com |
miikroad[.]com |
ogiivy[.]com |
q0nt0[.]com |
raiiwayapp[.]com |
scrlb3[.]com |
sh0rtcut[.]com |
slgmaprime[.]com |
slnglegrain[.]com |
spndesk[.]com |
twinmotlon[.]com |
tlnulti[.]com |
0penraven[.]com |
IP addresses |
94[.]154[.]35[.]15 |
This discovery underscores the importance of staying vigilant and proactive in protecting against such potential threats. It also highlights the need to monitor domain registrations, especially those that closely resemble our own, as well as staying abreast of the latest cybersecurity trends and best practices. By being aware of these potential risks and taking adequate measures to secure our domains, teams can collectively work towards mitigating the impact of such activities on organizations and the broader tech industry.
Interested in more research from Cado Security Labs? Check out the H2 2023 Cloud Threat Findings Report.