domains: a phishing chokepoint - icann · the goal a simple, straight-forward system that can...

48
Domains: A phishing chokepoint Carel Bitter | ICANN IDS 2019

Upload: others

Post on 11-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Domains: A phishing chokepointCarel Bitter | ICANN IDS 2019

Page 2: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Are these bad?(Spoiler alert: Yes)

Page 3: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Many are not marked as badNo messages seen...No significant traffic...No website to crawl...

...yet!

Page 4: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain
Page 5: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

?

Page 6: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

The goalA simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain string, with the goal of making a phish / not phish judgement, without having the actual phishing message available.

Page 7: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

The goalA simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain string, with the goal of making a phish / not phish judgement, without having the actual phishing message available.

Page 8: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

The goalA simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain string, with the goal of making a phish / not phish judgement, without having the actual phishing message available.

Page 9: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

The goalA simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain string, with the goal of making a phish / not phish judgement, without having the actual phishing message available.

Page 10: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Why target domains?The domains are a choke point. Break the chain and the phishing fails.

Domains are also well-supported to execute filtering decisions on. Browsers, email and DNS all support filtering on domain level.

Page 11: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Why target domains?There is a big opportunity for registries and registrars to proactively contribute towards fighting abuse.

Page 12: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

?

Page 13: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

1) Domain (string)Lots can be learned by just looking at the base (2nd level) domain.

Advantages: Readily available (zone files, pDNS, registrations)

Page 14: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Brands, context, actionsicloud.com-id-confirm.comlogin.icloud.com.igsx.gahelp.lnstagram-copyrightsupport.mlpaypallimitedsec-confirm.comaccounts.google.com.support-centre.sitepaypallimitionmanage.com

Page 15: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Brands, context, actionsicloud.com-id-confirm.comlogin.icloud.com.igsx.gahelp.lnstagram-copyrightsupport.mlpaypallimitedsec-confirm.comaccounts.google.com.support-centre.sitepaypallimitionmanage.com

Page 16: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Brands, context, actionsicloud.com-id-confirm.comlogin.icloud.com.igsx.gahelp.lnstagram-copyrightsupport.mlpaypallimitedsec-confirm.comaccounts.google.com.support-centre.sitepaypallimitionmanage.com

Page 17: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Brands, context, actionsicloud.com-id-confirm.comlogin.icloud.com.igsx.gahelp.lnstagram-copyrightsupport.mlpaypallimitedsec-confirm.comaccounts.google.com.support-centre.sitepaypallimitionmanage.com

Page 18: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Infrastructurenwolb.verification-ref4322.comoperator-security-config4.infofls-na.amazon.com.ssl-us.cfsecure.runescape.com-sdk.topsecure2.appleid.apple.com-app-ids299192.cominternet-security-0p3nei.ml

Page 19: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Infrastructurenwolb.verification-ref4322.comoperator-security-config4.infofls-na.amazon.com.ssl-us.cfsecure.runescape.com-sdk.topsecure2.appleid.apple.com-app-ids299192.cominternet-security-0p3nei.ml

Page 20: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Obfuscation help.lnstagram-copyrightsupport.mlappleld-flnd.cnpaypallimitionmanage.comaccountsumaryverfyapplyca.comlcloud-fmi-appleid.com https-pay-netf1ix.icu

Page 21: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Obfuscation help.lnstagram-copyrightsupport.mlappleld-flnd.cnpaypallimitionmanage.comaccountsumaryverfyapplyca.comlcloud-fmi-appleid.com https-pay-netf1ix.icu

Page 22: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Obfuscation detection (1)Edit distance: the number of operations required to change one string into another.

lnstagrarn > instagram = 3

Page 23: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Obfuscation detection (2)N-gram analysis, in this case using trigams.

security > sec ecu cur uri rit itysecurty > sec ecu cur urt rty

Page 24: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

HomοglyphsHomoglyphs provide for an excellent obfuscation method.

Page 25: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

HomοglyphsHomoglyphs provide for an excellent obfuscation method.

Page 26: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

HomοglyphsHomoglyphs provide for an excellent obfuscation method.

github.xn--aetwork-4x2zag.comgithub.aꜱꜱetworkꜱ.com

Page 27: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

HomοglyphsHomoglyphs provide for an excellent obfuscation method.

github.xn--aetwork-4x2zag.comgithub.aꜱꜱetworkꜱ.com

Page 28: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

?Domain String

Page 29: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

2) Domain metadataDomain metadata can be of great help in amplifying some other measurements.

Advantages: Mostly available (although sometimes difficult to get at scale).

Page 30: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Domain ageReputation is gained over time. Old means a long standing and continuous investment.New can be suspicious.

Page 31: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Domain expiryNew, and for <1 yearNew, and for >1 yearOld, and for <1 yearOld, and for >1 year

Page 32: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Domain TLDFree vs. paid-forccTLD/gTLD/new gTLD/free TLD/pseudo TLDOpen vs. restricted registration

Page 33: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Domain TLDFree vs. paid-forccTLD/gTLD/new gTLD/free TLD/pseudo TLDOpen vs. restricted registrationOperationally hard: pricing and promotions

Page 34: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

?Domain String

Domain Meta

Page 35: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

3) DNSDNS information gives us anchors for attaching history and reputation.

Advantages: Cheap to get at scale, history exists, reputation exists.

Page 36: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

NS RecordsThese can be found without touching miscreant infrastructure.

Age, self-NS vs external, NS IP addresses, reputation of those IP addresses, volatility, pDNS history ...

Page 37: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

A/MX/TXT/etc recordsCaveat: by doing a record lookup that needs an answer from the domain authoratives you might reveal yourself.

Augment and expand as you would for NS.

Page 38: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

?Domain String

Domain Meta

DNS

Page 39: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

4) SSL certificatesNewly created SSL certificates are public, thanks to the Certificate Transparency project.

Advantages: Free and open, near realtime.

Page 40: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Certificate issuerWho issued the certificate?

Paid vs. free

Page 41: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Certificate calendar mappingCompare certificate issue date to the domain issue date.

Same considerations apply as to domain age.

Page 42: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Common Name (CN)A certificate is usually given out for a specific name on a domain.

Page 43: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Common Name (CN)A certificate is usually given out for a specific name on a domain.

com-id-login.uscopyright-10000739255.info

joonggonara-613901.cf

Page 44: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Common Name (CN)A certificate is usually given out for a specific name on a domain.

appleid.apple.com-id-login.usfacebook.com.copyright-10000739255.info

pay.naver.com-cafe.joonggonara-613901.cf

Page 45: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Common Name (CN)Sometimes the entire domain is new: Certificates can be an input by itself.

The stream itself is a valuable source of domains (but: good and bad).

Page 46: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

?Domain String

Domain Meta

DNS

Certs

Page 47: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

ConclusionFinding suspect phishing domains without having the phishing message is certainly possible. There is plenty of low-hanging fruit and places to pick it. Depending on your appetite for risk, various mitigation strategies are possible.

Page 48: Domains: A phishing chokepoint - ICANN · The goal A simple, straight-forward system that can expand using readily or easily available data on nothing more than the second level domain

Thank you!For domain reputation discussions, metadata tales and my famous salmon recipe:

[email protected]