Doppelganger Danger

Doppelganger Danger

How one small dot—if part of a typosquat—can lead to security breach

In the world of literature, folklore and myth, the appearance of a doppelganger is generally bad news. Often depicted as ghostly doubles (and literally meaning “double walkers” in German), doppelgangers usually portend illness, danger or even death when they show up in stories. Well, now the same is pretty much true when they surface in the world of e-commerce.

Doppelganger domains, as they’ve been dubbed, are domains whose names are nearly identical to those of legitimate companies except the doppelganger version—registered for presumably nefarious purposes— is strategically missing the dot that separates the legitimate version’s subdomain from the domain. For example, “ussecurity.com” would be a doppelganger for “us.security.com.” E-mails intended for the latter domain but sent without the initial dot would be routed to the doppelganger site, potentially for malicious use. Cyberthieves deploying the doppelganger site could then cover the misdirection by redirecting the original e-mail to the legitimate domain.

At the same time, the doppelganging ne’er-dowells could also send out e-mails from their bogus domains and hope that some recipients wouldn’t notice the missing dot and open the e-mail. Malware could ensue.

Squatter’s Rights?

Now, from one angle, doppelganger domains are merely variations on a theme that has been playing on the Internet for about as long as e-commerce has been around. They are forms of the larger general practice known as “typosquatting,” or URL hijacking, which relies on the same principle of exploitation whereby cyberthieves register domains with names that are deliberately very close-sounding to legitimate names in hopes that users will unwittingly arrive at the squatted site by virtue of making a typo when entering the Web address.

Usually, the variance in the squatted domain name is the absence or presence of a single letter (“yuube. com” instead of “youtube.com,” for example) or a different top-level domain (“us.security.org” as opposed to “us.security.com”). With the availability of generic top-level domains set to expand this year (and, given the necessary approval process, to actually start appearing in 2013), the opportunities for mistakes and malefaction associated with this ploy are likely to increase. The only thing making doppelganger domains distinct from other forms of cybersquatting is the absence of their one tiny, potentially easy-to-miss, subdomain-dividing dot.

Researchers at Godai Group, a San Franciscobased “information security think tank,” coined the term for the new breed of hacking misdeed in their recently issued white paper on the subject (found at http://godaigroup.net). In the paper, they note that doppelganger domains “have a potent impact via email as attackers could gather information such as trade secrets, user names and passwords, and other employee information.”

To prove their point, the researchers profiled every Fortune 500 company and found 151 of them (or 30 percent) vulnerable to doppelganger domain danger. By industry, specialty retailers were the most susceptible to the fraud, followed closely by commercial banks and telecommunications companies.

During its research, the group found that some doppelganger domains for the companies had already been registered to locations in China and to domains associated with malware and phishing. According to the report, “While it is unknown if these domains are used in a malicious fashion, it is apparent that some targeting is happening here.”

Further, the group set up 30 doppelganger accounts itself for various firms just to see what would happen. After a six-month test period, the accounts had attracted 120,000 e-mails amounting to 20 gigabytes of data, including potentially valuable information such as contracts, invoices, reports, network diagrams and more.

“Twenty gigs of data is a lot of data in six months of really doing nothing,” said senior researcher Peter Kim to Wired. “And nobody knows this is happening.”

Doppel Jeopardy

The Godai Group recommends several steps for mitigating doppelganger danger, including purchasing and registering any conceivable doppelganger domain; internally configuring Domain Name System (DNS) servers to not resolve any doppelganger domains (which would protect internal-only e-mail from being accidentally sent to one); and identifying if attackers are already using a doppelganger domain against your company and, if so, filing a Uniform Domain Dispute Resolution Policy (UDRP) against them with the Internet Corporation for Assigned Names and Numbers (ICANN).

The obvious challenge of trying to proactively buy up the doppelganger domains is that the number of potential mistypings of a particular URL is not necessarily fathomable, making it at the very least difficult to acquire all of them so that a company would not be vulnerable to this type of hacktivity.

For smaller companies, the time and expense of preventing such potential typo-oriented security breaches could be a factor and call into question how significant a threat this type of attack really is. After all, according to the Godai Group’s own results, most companies—70 percent, in fact—were not deemed susceptible to doppelganger jeopardy. Nevertheless, the group noted that while its research focused on Fortune 500 companies, the vulnerability could exist for any organization that uses subdomains.

The group notes in the paper that it does free domain scanning to determine doppelganger susceptibility. For more information, visit http://godaigroup. net/free-doppelganger-domain-scan/.

This article originally appeared in the January 2012 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3