
Cyber-attacks utilizing malicious lookalike domains, e-mail addresses and different varieties of registered identifiers are rising, area identify system (DNS) safety supplier Infoblox discovered.
In a latest report, referred to as A Deeper Look at Lookalike Attacks, which the corporate will current at Infosecurity Europe, the Infoblox Risk Intelligence Group (TIG) discovered over 1600 domains used for the reason that starting of 2022 alone that contained a mixture of company and MFA lookalike options, with worldwide targets starting from massive firms to main banks, software program firms, web service suppliers, and authorities entities.
Nevertheless excessive that quantity may sound, it’s nothing in comparison with the surge in top-level area (TLD) registering, which makes it tougher for safety researchers to identify the unhealthy apples, Gary Cox, technical director for Western Europe at Infoblox, informed Infosecurity.
“On common, there are 180,000 new domains registered each single day, which equates to roughly two per second. Definitely, not all of these will probably be lookalikes, not to mention malicious, in fact. However with that quantity, figuring out the malicious lookalikes is like looking for a needle in a haystack. No marvel Infoblox had to have a look at over 70 billion DNS information to place this report collectively,” Cox mentioned.
A Needle in a Haystack
However, Cox added that the surge in registered lookalikes has extra to do with criminality and fewer with this TLD utilization improve.
“It is difficult immediately to get a TLD in [.]com. But when I need to go for [.]xyz, [.]prime or [.]tk – which is managed by Tokelau, a small island and territory of New Zealand within the South Pacific and has extensively been used for malicious functions – it is very straightforward and low cost,” he mentioned.
“We have to analyze issues earlier than they’re outlined as malware and given fancy names.”Gary Cox, technical director, Western Europe, Infoblox
Whereas cybersecurity researchers have lengthy been analyzing typosquatting assaults, the place attackers exploit frequent typing errors by registering domains that intently resemble widespread web sites (e.g. substituting ‘google.com’ with ‘googgle.com’) to deceive customers, lookalike domains now take different varieties akin to homographs (or homoglyphs), which use visually related characters from completely different character units (e.g. Cyrillic) to create domains that seem equivalent to reliable ones (e.g. substituting ‘a’ with ‘α’) and combosquats, a mixture of the earlier two.
The document discovered that combosquatting domains are 100 instances extra prevalent than typosquatting domains and that 60% of abusive combosquatting domains are lively for over 1000 days.
A brand new lookalike approach, referred to as soundsquatting, can also be rising. It first appeared in 2014 and leverages using homophones to trick customers who hear the area relatively than learn it – akin to when utilizing a private assistant.
Everyone seems to be a Goal
Lookalikes domains “are sometimes related to broad, untargeted assaults on customers by way of e-mail spam, promoting, social media, and SMS messages. [They] are so synonymous with phishing assaults that safety consciousness coaching consists of studying to examine hyperlinks for them,” Infoblox report reads.
And rightly so: The Anti-Phishing Working Group (APWG), of which Infoblox is a founding member, reported that phishing reached document ranges within the third quarter of 2022, with recognized lookalike techniques akin to homographs, typosquats, combosquats and soundsquats.
Nevertheless, they aren’t only a risk to people however are additionally used to realize entry to company networks. “There have all the time been and doubtless all the time will probably be some larger targets, akin to banks, prescription drugs and something associated to industrial methods, however the backside line is: everyone seems to be a goal,” Cox mentioned.
Anthony James, VP for product advertising and marketing at Infoblox, will give a presentation on DNS Detection and Response (DDR) throughout Infosecurity Europe on Wednesday, June 21. Register here.
Within the report, Infoblox supplied many examples of lookalike assault victims, from SMEs by way of multinational enterprises throughout all sectors, together with cryptocurrencies, humanitarian organizations, monetary firms, well-known retail manufacturers, and authorities businesses – even Infoblox was extensively focused, the report said.
Lookalike assaults are efficient as a result of our human mind short-circuits whereas studying – the identical cause our mind can learn phrases even when the letters are barely jumbled.

Punycode, Electronic mail Safety and DNS Safety
There are safety measures in place to defend customers in opposition to lookalikes assaults, akin to e-mail filtering options, anti-phishing and anti-smishing instruments or the online browser operate Punycode, which permits them to ‘translate’ the domains from Unicode characters into American Customary Code for Info Interchange (ASCII), a smaller, restricted character set.
Nevertheless, these instruments are usually not a silver bullet and malicious lookalike domains do bypass these guardrails.
In response to Mozilla, proprietor of the Firefox browser, the primary duty ought to be on the registries’ shoulders.
“It’s as much as registries to be sure that their prospects can not rip one another off. Browsers can put some technical restrictions in place, however we’re not ready to do that job for them whereas nonetheless sustaining a stage enjoying subject for non-Latin scripts on the net. The registries are the one folks ready to implement the correct checking right here. For our half, we need to be sure that we don’t deal with non-Latin scripts as second-class residents,” reads Mozilla’s description of its internationalized area identify (IDN) show algorithm.
Cox agreed: “Browser suppliers and private assistant distributors can’t be made answerable for failing to detect malicious lookalike domains.”
That’s the place DNS safety comes into place, he added. “I firmly consider in defense-in-depth, however we should additionally analyze issues earlier than they’re outlined as malware and given fancy names. If one thing seems suspicious due to the way it was being arrange, the infrastructure it is hosted on, the historical past of the particular person registering it or the TLD it was registered on, we are able to begin investigating. All these attributes, none of which on their very own give us any definitive image, might help begin to construct up a view of a stage of suspicion.”
Findings from the Infoblox report on lookalike assaults got here from DNS occasion detections from January 2022 to March 2023.