{"id":9087,"date":"2017-09-05T08:10:35","date_gmt":"2017-09-05T16:10:35","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/05\/news-2860\/"},"modified":"2017-09-05T08:10:35","modified_gmt":"2017-09-05T16:10:35","slug":"news-2860","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/05\/news-2860\/","title":{"rendered":"Expired domain names and malvertising"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 05 Sep 2017 15:00:08 +0000<\/strong><\/p>\n<p>In <a href=\"https:\/\/www.malwarebytes.com\/pdf\/labs\/Cybercrime-Tactics-and-Techniques-Q1-2017.pdf\" target=\"_blank\" rel=\"noopener\">Q1<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/pdf\/white-papers\/CybercrimeTacticsAndTechniques-Q2-2017.pdf\" target=\"_blank\" rel=\"noopener\">Q2<\/a> of 2017, we noticed a sharp decline in drive-by downloads coming from compromised websites. The campaigns of the past are either gone (<a href=\"https:\/\/blog.sucuri.net\/2015\/12\/evolution-of-pseudo-darkleech.html\" target=\"_blank\" rel=\"noopener\">Pseudo Darkleech<\/a>) or have changed focus (<a href=\"http:\/\/www.malware-traffic-analysis.net\/2017\/09\/01\/index.html\" target=\"_blank\" rel=\"noopener\">EITest using social engineering techniques<\/a>).<\/p>\n<p>Malvertising &#8211; which has remained steady and is currently the main driving force behind some of the most common malware and scam distribution operations- not only stems from various publishers but also from &#8216;abandoned&#8217; websites. Those related domains once served a legitimate purpose but were never renewed by their owners and fell into the hands of actors looking to make a quick profit using questionable practices.<\/p>\n<p>In this post, we take a look at how malicious redirections from expired domains work and what kind of traffic they lead to.<\/p>\n<h3>The life, death, and resurrection of a domain name<\/h3>\n<p>Most issues when it comes to web security don&#8217;t usually come from the platforms themselves but from the people that run them or from properties that have simply been relinquished. The folks over at Sucuri have written about this extensively and in a <a href=\"https:\/\/blog.sucuri.net\/2017\/08\/expired-domain-wordpress-plugin-redirects.html\" target=\"_blank\" rel=\"noopener\">recent post<\/a>, they showed how expired domains and outdated plugins in popular CMS were a deadly mix, resulting in malicious redirects.<\/p>\n<p>Here is an example of a website, <em>oezelotel[.]com<\/em> first registered to <em>denizduezguen@yahoo.de<\/em>\u00a0on 03\/10\/2014, that once was advertising various hotels, was wiped in 2016, and eventually got parked as its domain name registration was never renewed.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/domain_history.gif\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19514 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/domain_history.gif\" alt=\"\" width=\"1196\" height=\"919\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 1: Evolution of a website over time and its eventual expired domain name<\/em><\/p>\n<h3>New owner, clear motive<\/h3>\n<p>A historical <em>whois<\/em>\u00a0on the parked domain courtesy of <a href=\"http:\/\/www.hyas.com\/comox2\" target=\"_blank\" rel=\"noopener\">Hyas&#8217; Comox<\/a> shows that on June 4, 2017, the domain name changed hands from its original owner to\u00a0<em>domainmanagers@outlook.com<\/em>. This is also when the site changed hosting (moving from a Germany based server to a US one) and began exhibiting its malicious behavior.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/hosting.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19517\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/hosting.png\" alt=\"\" width=\"751\" height=\"542\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/hosting.png 751w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/hosting-300x217.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/hosting-600x433.png 600w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/a><\/p>\n<p>A cursory review of some other properties owned by the same registrant indicates a penchant for going after expired domains and monetizing them via dubious ad networks. DomainTools has over <strong><a href=\"http:\/\/reversewhois.domaintools.com\/?refine#q=%5B%5B%5B%22owner%22%2C%220%22%2C%22domainmanagers%40outlook.com%22%5D%5D%5D\" target=\"_blank\" rel=\"noopener\">23 K records<\/a><\/strong> belonging to that same email address.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/parked.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-19519\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/parked.png\" alt=\"\" width=\"919\" height=\"750\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/parked.png 919w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/parked-300x245.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/parked-600x490.png 600w\" sizes=\"auto, (max-width: 919px) 100vw, 919px\" \/><\/a><\/p>\n<h3>Malvertising roulette<\/h3>\n<p>You might think a non-existent site is harmless but this couldn&#8217;t be further from the truth. Abandoned or forgotten domains are often registered and &#8216;parked&#8217; to generate low-quality traffic (i.e. spammy links) as described in <a href=\"https:\/\/blog.sucuri.net\/2016\/06\/spam-via-expired-domains.html\" target=\"_blank\" rel=\"noopener\">yet another blog post<\/a> from Sucuri, and it is a real &#8211; lucrative &#8211; business model.<\/p>\n<p>We observed different types of traffic, ranging from bogus surveys to more nefarious activity such as drive-by attacks and tech support scams, based on\u00a0a visitor&#8217;s user agent. Note that the following examples did not require users to click on any link, the simple fact of visiting the site triggered an automatic redirection.<\/p>\n<h4>RIG EK Flow:<\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/RIG-Bunitu.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19493 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/RIG-Bunitu.png\" alt=\"\" width=\"610\" height=\"156\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/RIG-Bunitu.png 610w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/RIG-Bunitu-300x77.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/RIG-Bunitu-600x153.png 600w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 2: RIG exploit kit infection chain via the Fobos campaign that delivers the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2015\/08\/whos-behind-your-proxy-uncovering-bunitus-secrets\/\" target=\"_blank\" rel=\"noopener\">Bunitu Trojan<\/a>.<\/em><\/p>\n<pre><strong>oezelotel[.]com (parked site) -&gt; xml1.limeclick[.]com<\/strong>  &lt;html&gt;&lt;head&gt;&lt;title&gt;Loading&lt;\/title&gt;&lt;\/head&gt;   &lt;body&gt;&lt;script&gt;location.href='http:\/\/xml1.limeclick[.]com  \/click?i=SXRzS*SmiP4_0';&lt;\/script&gt;&lt;\/body&gt;&lt;\/html&gt;  <strong>  xml1.limeclick[.]com -&gt; bingfreegames3[.]info  <\/strong>&lt;iframe frameborder='0' id='291733' src='http:\/\/212kjhguihkhbvd[.]cf\/  ssl\/index.php?ps=49506017476' width='313' height='313' dir='0' &gt;&lt;\/iframe&gt;    <strong>212kjhguihkhbvd[.]cf -&gt; 188.225.27.234 (RIG EK landing)<\/strong>  &lt;iframe id=\"91130118\" width=278 double=\"1\" height=278 src=  \"http:\/\/188.225.27[.]234\/?NTkwNTc2&amp;mano={redacted}\" &gt;  &lt;\/iframe&gt;  <\/pre>\n<h4><strong>Tech Support Scam (TSS) flow:<br \/> <\/strong><\/h4>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS_traffic.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19495 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS_traffic.png\" alt=\"\" width=\"687\" height=\"209\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS_traffic.png 687w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS_traffic-300x91.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS_traffic-600x183.png 600w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 3: Redirection to tech support scam via blobar[.org]<\/em><\/p>\n<pre><strong>oezelotel[.]com (parked site) -&gt; bougainvillaeabuffeting[.]com<\/strong>  &lt;html&gt;&lt;head&gt;&lt;title&gt;Loading&lt;\/title&gt;&lt;\/head&gt;  &lt;body&gt;&lt;script&gt;location.href='http:\/\/bougainvillaeabuffeting[.]com\/d\/  r5t9b73131?rtb={redacted}&amp;subid=oezelotel.com';&lt;\/script&gt;&lt;\/body&gt;&lt;\/html&gt;    <strong>bougainvillaeabuffeting[.]com -&gt; blobar[.]org<\/strong>  document.write('&lt;META http-equiv=\"refresh\" content=\"0;url='+u+'\"&gt;');  &lt;\/SCRIPT&gt;&lt;NOSCRIPT&gt;&lt;META http-equiv=\"refresh\" content=\"0;url=  https:\/\/blobar.org\/d\/0&rtb={redacted}&subid=oezelotel.com&r=  http%3A%2F%2Foezelotel.com%2F\"&gt;&lt;\/NOSCRIPT&gt;  &lt;META name=\"referrer\" content=\"no-referrer\"&gt;    <strong>blobar[.]org -&gt; www.alrtsyscalling[.]cf (TSS landing)<\/strong>  Location: https:\/\/www.alrtsyscalling[.]cf\/call-microsoft-support-at-1-855-633-1666  <\/pre>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS2.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19515 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS2.png\" alt=\"\" width=\"1196\" height=\"800\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS2.png 1196w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS2-300x201.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/TSS2-600x401.png 600w\" sizes=\"auto, (max-width: 1196px) 100vw, 1196px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 4: Browser locker serving a tech support scam page (IP address is hard coded in picture)<\/em><\/p>\n<h3>Traffic and user targeting<\/h3>\n<p>These days it seems irrelevant how malicious actors get their leads, so long as they are genuine users they can expose to malware or scams. An advantage of using ad networks and malvertising is that a lot of the filtering can be handled throughout the distribution chain, with remarkable efficiency, compared to server side checks on compromised sites.<\/p>\n<p>Parked domains are one of many scenarios of hijacking traffic and monetizing it. While those practices raise eyebrows, are they actually illegal? Is it something that domain name registrars should enforce or ban? Those are interesting questions worth debating.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> blocks a lot of domains associated with malvertising as well as drive-by download attempts. Because we are witnessing more and more social engineering attacks, we highly recommend you spread the word about one of the most common scams today, the <a href=\"https:\/\/blog.malwarebytes.com\/tech-support-scams\/\" target=\"_blank\" rel=\"noopener\">tech support scam<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/expired-domain-names-and-malvertising\/\">Expired domain names and malvertising<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/expired-domain-names-and-malvertising\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 05 Sep 2017 15:00:08 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/expired-domain-names-and-malvertising\/' title='Expired domain names and malvertising'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/Untitled-design.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A look at how expired domain names can be turned into a lucrative malicious traffic redirection tool.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/domain\/\" rel=\"tag\">domain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/registrant\/\" rel=\"tag\">registrant<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/registrar\/\" rel=\"tag\">registrar<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tech-support-scam\/\" rel=\"tag\">tech support scam<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/expired-domain-names-and-malvertising\/' title='Expired domain names and malvertising'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/expired-domain-names-and-malvertising\/\">Expired domain names and malvertising<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[13661,10531,3764,14405,14406,10544,10494],"class_list":["post-9087","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-domain","tag-malvertising","tag-malware","tag-registrant","tag-registrar","tag-tech-support-scam","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9087"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9087\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9087"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}