Doppelganger Danger

Doppelganger Danger

How one small dot—if part of a typosquat—can lead to security breach

In the world of literature, folklore and myth, the appearance of a doppelganger is generally bad news. Often depicted as ghostly doubles (and literally meaning “double walkers” in German), doppelgangers usually portend illness, danger or even death when they show up in stories. Well, now the same is pretty much true when they surface in the world of e-commerce.

Doppelganger domains, as they’ve been dubbed, are domains whose names are nearly identical to those of legitimate companies except the doppelganger version—registered for presumably nefarious purposes— is strategically missing the dot that separates the legitimate version’s subdomain from the domain. For example, “ussecurity.com” would be a doppelganger for “us.security.com.” E-mails intended for the latter domain but sent without the initial dot would be routed to the doppelganger site, potentially for malicious use. Cyberthieves deploying the doppelganger site could then cover the misdirection by redirecting the original e-mail to the legitimate domain.

At the same time, the doppelganging ne’er-dowells could also send out e-mails from their bogus domains and hope that some recipients wouldn’t notice the missing dot and open the e-mail. Malware could ensue.

Squatter’s Rights?

Now, from one angle, doppelganger domains are merely variations on a theme that has been playing on the Internet for about as long as e-commerce has been around. They are forms of the larger general practice known as “typosquatting,” or URL hijacking, which relies on the same principle of exploitation whereby cyberthieves register domains with names that are deliberately very close-sounding to legitimate names in hopes that users will unwittingly arrive at the squatted site by virtue of making a typo when entering the Web address.

Usually, the variance in the squatted domain name is the absence or presence of a single letter (“yuube. com” instead of “youtube.com,” for example) or a different top-level domain (“us.security.org” as opposed to “us.security.com”). With the availability of generic top-level domains set to expand this year (and, given the necessary approval process, to actually start appearing in 2013), the opportunities for mistakes and malefaction associated with this ploy are likely to increase. The only thing making doppelganger domains distinct from other forms of cybersquatting is the absence of their one tiny, potentially easy-to-miss, subdomain-dividing dot.

Researchers at Godai Group, a San Franciscobased “information security think tank,” coined the term for the new breed of hacking misdeed in their recently issued white paper on the subject (found at http://godaigroup.net). In the paper, they note that doppelganger domains “have a potent impact via email as attackers could gather information such as trade secrets, user names and passwords, and other employee information.”

To prove their point, the researchers profiled every Fortune 500 company and found 151 of them (or 30 percent) vulnerable to doppelganger domain danger. By industry, specialty retailers were the most susceptible to the fraud, followed closely by commercial banks and telecommunications companies.

During its research, the group found that some doppelganger domains for the companies had already been registered to locations in China and to domains associated with malware and phishing. According to the report, “While it is unknown if these domains are used in a malicious fashion, it is apparent that some targeting is happening here.”

Further, the group set up 30 doppelganger accounts itself for various firms just to see what would happen. After a six-month test period, the accounts had attracted 120,000 e-mails amounting to 20 gigabytes of data, including potentially valuable information such as contracts, invoices, reports, network diagrams and more.

“Twenty gigs of data is a lot of data in six months of really doing nothing,” said senior researcher Peter Kim to Wired. “And nobody knows this is happening.”

Doppel Jeopardy

The Godai Group recommends several steps for mitigating doppelganger danger, including purchasing and registering any conceivable doppelganger domain; internally configuring Domain Name System (DNS) servers to not resolve any doppelganger domains (which would protect internal-only e-mail from being accidentally sent to one); and identifying if attackers are already using a doppelganger domain against your company and, if so, filing a Uniform Domain Dispute Resolution Policy (UDRP) against them with the Internet Corporation for Assigned Names and Numbers (ICANN).

The obvious challenge of trying to proactively buy up the doppelganger domains is that the number of potential mistypings of a particular URL is not necessarily fathomable, making it at the very least difficult to acquire all of them so that a company would not be vulnerable to this type of hacktivity.

For smaller companies, the time and expense of preventing such potential typo-oriented security breaches could be a factor and call into question how significant a threat this type of attack really is. After all, according to the Godai Group’s own results, most companies—70 percent, in fact—were not deemed susceptible to doppelganger jeopardy. Nevertheless, the group noted that while its research focused on Fortune 500 companies, the vulnerability could exist for any organization that uses subdomains.

The group notes in the paper that it does free domain scanning to determine doppelganger susceptibility. For more information, visit http://godaigroup. net/free-doppelganger-domain-scan/.

This article originally appeared in the January 2012 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3