{"id":24089,"date":"2024-03-05T10:10:04","date_gmt":"2024-03-05T18:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/03\/05\/news-17819\/"},"modified":"2024-03-05T10:10:04","modified_gmt":"2024-03-05T18:10:04","slug":"news-17819","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/03\/05\/news-17819\/","title":{"rendered":"Check your DNS! Abandoned domains used to bypass spam checks"},"content":{"rendered":"\n<p><a href=\"https:\/\/labs.guard.io\/subdomailing-thousands-of-hijacked-major-brand-subdomains-found-bombarding-users-with-millions-a5e5fb892935\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Researchers at Guardio Labs<\/a> have discovered that a group of spammers is using long-forgotten subdomains from established brands like MSN, eBay, CBS, and Marvel to send out malicious emails. The emails can bypass spam checks and to recipients they look like they come from a legitimate source.<\/p>\n<p>A subdomain is a named sub-division of domain name. For example <code>my.malwarebytes.com<\/code> and <code>www.malwarebytes.com<\/code> are both subdomains of the <code>malwarebytes.com<\/code> domain. <\/p>\n<p>Companies use subdomains for all kinds of purposes, from differentiating marketing campaigns to naming different online systems.<\/p>\n<p>It&#8217;s also common practice for companies to create CNAME (Canonical Name) DNS records that alias a subdomain to another domain or subdomain.<\/p>\n<p>For example, the subdomain <code>my.malwarebytes.com<\/code> is an easy to read alias for a CloudFront server called <code>d1ok04i2z9vvoy.cloudfront.net<\/code>. <\/p>\n<p>When companies use these techniques and don&#8217;t clean up their records after they&#8217;re done, criminals can take advantage. <\/p>\n<p>The researchers provide the example of <code>marthastewart.msn.com<\/code>, which was an alias for the <code>msnmarthastewartsweeps.com<\/code> domain.<\/p>\n<p>At some point, MSN no longer needed the <code>msnmarthastewartsweeps.com<\/code> domain and stopped paying for it, but did not remove the CNAME record that alised <code>marthastewart.msn.com<\/code> to it. <\/p>\n<p>Criminals discovered the link between the two and bought the <code>msnmarthastewartsweeps.com<\/code> domain.<\/p>\n<p>This is bad, as the researchers explain:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>This means that the subdomain inherits the entire behavior of <code>msnmarthastewartsweeps.com<\/code> , including it\u2019s SPF policy.<\/p>\n<\/blockquote>\n<p>The Sender Policy Framework (SPF) is an anti-spam DNS record that sets out what domains and IP addresses can send email for a particular domain. <\/p>\n<p>By registering the old and forgotten alias <code>msnmarthastewartsweeps.com<\/code>, the criminals were able to add their own IP addresses to the SPF record, allowing them to send spam from <code>marthastewart.msn.com<\/code> that passes SPF checks.<\/p>\n<p>Guardio Labs warns that SPF also offers criminals another way to gain control. SPF&#8217;s <code>include:<\/code> syntax can include a list of other domain names that are allowed to send emails on behalf of a domain. If any of the included domains are abandoned, criminals can buy them up and send email on behalf of the parent domain.<\/p>\n<p>Once the researchers knew what they were looking for they identified thousands of instances of so-called &#8220;subdomailing&#8221;, encompassing both CNAME and SPF-based tactics and going back at least two years.<\/p>\n<p>The sheer number of hijacked subdomains and available IP addresses is big enough for the criminals to cycle through them to minimize detection and depletion of their \u201cassets.\u201d<\/p>\n<p>As an organization it is important to regularly check your domains for signs of compromise and better manage your online assets\u2014starting with removing unused subdomains and DNS records.<\/p>\n<p>Guardio Labs has created a special <a href=\"http:\/\/www.guard.io\/subdomailing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">subdomailing checker website<\/a>, allowing domain administrators and site owners to quickly check if any trace of abuse has been found. The researchers note that the checker queries a database with the latest domains impacted by CNAME and SPF-based hijacking. So, a positive result does not mean you are safe, just that you haven\u2019t been hijacked yet.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-371336e6-815b-4134-8818-f944dbc308bb\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/03\/check-your-dns-abandoned-domains-used-to-bypass-spam-checks\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Researchers have uncovered thousands of &#8220;subdomailing&#8221; campaigns. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30975,2768,30976,32,10518,17332,30977,30978],"class_list":["post-24089","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cname","tag-hijacking","tag-include","tag-news","tag-spam","tag-spf","tag-subdomailing","tag-subdomain"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24089"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24089\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24089"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}