In the course of investigating suspect domains, a few sources of data are typically considered. The first source that most would think of is VirusTotal, and for good reason. A less commonly used source is Whois. We’ve used Whois information previously to observe exploit kit domain life cycles, comparing query volumes to registration dates.

By sampling our domain intelligence, a list of malicious domains was created. Querying a proprietary Whois database, a list of email addresses, which have been used to register at least one malicious domain, was created. Applying a technique often referred to as reverse Whois, this list of email addresses was then used to expand the original domain list. Feeding the labeled domains and email addresses to a semantic network library and then to OpenGraphiti – our soon-to-be open sourced 3d visualization engine, some interesting relationships were observed.

Groupings of domains which share a registrant contact email address are explored below.

Red nodes are known malicious domains (blacklisted by OpenDNS), green nodes are known benign domains (whitelisted by OpenDNS) and white nodes are either domains with no alignment, or no email addresses.

Some email addresses from our research are associated with a mix of malicious and benign domains:

Image1

Some email addresses were seen to have registered only a few malicious domains. Possible explanations include misclassification of the malicious domain, the domain was compromised and repurposed maliciously, or perhaps the domain was malicious, sinkholed, and had its registrant contact email updated. It’s also possible that the email address used to register the domains was at some point compromised and used to register a domain for malicious use:

image2

Some email addresses registered a balanced mix of good, bad, and benign domains:

image3

Some email addresses were observed to have registered one whitelisted domain, a few blacklisted domains, and a large set of benign domains:

image4

Many groups had a majority of domains in our blacklist with a small minority of sibling domains categorized as benign. These particular groups are interesting as the benign domains (white) are highly suspect:

image 5

A large majority of the groups formed looked like the image below. Notice some domains are blacklisted and most are unknown. Having such a large number of domains, with a mix of alignments, sharing a single registrant contact email address is indicative of a proxy registration service. In these cases the sibling domains are likely unrelated to each other:

Screen Shot 2014-07-31 at 10.11.39 AM

Similar to proxy registration email address groupings, abuse desks are another type of large group that are usually comprised of half unknown and half blacklisted domains. The lower right point in the below graphic is an abuse desk email address, while the rest of the nodes are domains registered with that Whois registrant contact email address. Red nodes are known malicious domains, while white nodes are domains with unknown or benign intent. If a domain’s Whois contact email address has recently been changed to a registrar’s abuse desk, chances are the domain has an outstanding abuse complaint and is under investigation:

image7

Though our research into registrant-to-maliciousness has just begun, the initial results look promising enough to continue gathering data and investigating the results.

This post is categorized in: