• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Free Trial
  • Contact us
  • Blog
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Products
    • Product
      • Cisco Umbrella Cloud Security Service
      • Cisco Umbrella Investigate
      • Product Packages
      • Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Interactive Intelligence
      • Cloud-Delivered Firewall
    •  
    • Webinar signup
  • Solutions
    • By Need
      • Protect Mobile Users
      • Fast Incident Response
      • Web Content Filtering
      • Shadow IT Discovery & App Blocking
      • Unified Threat Enforcement
      • Reduce Security Infections
      • Secure Direct Internet Access
      • Securing Remote and Roaming Users
    • By Network
      • Protect Guest Wi-Fi
      • SD-WAN Security
      • Off-Network Endpoint Security
    • By Industry
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
      • Our Customers
      • Customer Stories
    • Ransomware Defense for Dummies book
  • Why Us
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Cloud Network Activity
      • Recursive DNS Services
      • Top Reasons to Trial
      • Getting Started
    • Unmatched Intelligence
      • Cyber Attack Prevention
      • Interactive Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco SD-WAN
    • Navigation-dropdown-promo-free-trial_102820
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Analyst Reports
      • Case Studies
      • Customer Videos
      • Datasheets
      • eBooks
      • Infographics
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Cisco Umbrella Blog
      • Latest Posts
      • Security Posts
      • Research Posts
      • Threats Posts
      • Product Posts
      • Spotlight
    • For Customers
      • Support
      • Customer Success Hub
      • Umbrella Deployment Hub
      • Customer Success Webinars
      • What’s New
      • Cisco Umbrella Studio
  • Trends & Threats
    • Market Trends
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
      • Secure Access Service Edge (SASE)
    • Security Threats
      • Ransomware
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
    •  
    • Navigation-dropdown-promo-threat-report_020521
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Become a partner
  • Free Trial Signup
  • Umbrella Login
  • Cloudlock Login
  • Contact Us
Security

Automating imposter domain discovery

By Brad Antoniewicz
Posted on July 8, 2016
Updated on March 18, 2020

Share

Facebook0Tweet0LinkedIn0
Screen-Shot-2016-06-27-at-11.46.35-AM
Deceiving domains lure users

Attackers have long used typosquatting, brandjacking, and similar methods to deceive users into unknowingly visiting malicious websites. To keep the asymmetric battle going, defenders have taken up searching newly registered domain names to uncover these threats before they materialize. In this post we’ll share the common patterns we see, plus a technique for automating discovery so you can one-up those pesky attackers.

Prepending or appending common words

The pentesters out there will agree that one tried-and-true recipe for a successful phishing exercise is to send an email with “mandatory” in the subject line and a link to malicious page hosted at “companyname-support.com”. Prepending or appending common tech words to a brand is one of the most common techniques used by attackers; it works because users find something inherently trustworthy about a familiar string such as the company name or internally used jargon. Searching for occurrences of these is simple:
Basic Regex

Character substitution

Substituting visually similar characters is another common method. Here the attacker may use letters like uppercase “i” or lowercase “L”interchangeably or replace letters with numbers in a leet speak  fashion. We can expand our regex to incorporate this pretty easily as well:
Regex includes character sub.

Repeated characters

Finally, repeated characters in a brand can be often mistakenly left out, duplicated, or overlooked. For instance, an attacker may register facebok.com, or perhaps a user may mistakenly type faceboook.com. A minor change to our regex can adjust for repeated characters:
Regex includes repeated characters

Automating discovery

While our classification algorithms have automated the broad discovery of these types of attacks at a much more advanced level, responders can still benefit from basic pattern searching on the brands they need to worry about. The Investigate API is the perfect tool for facilitating this type of automation, and pyinvestigate makes interacting with the API painless. To search for a string within the last 24 hours, you can:

Regex Generator

If you’re monitoring just a single brand, you might be able to get away with creating static regular expressions. However, to support searching for many brands, you’ll need to implement a basic regex generator. Here’s an example of one that will look up static mappings for each letter of the brand and return a list of character substitutions:

Search Constraints

It makes sense to search within an extended time period when you first search for imposter domains so that you can get a feel for what’s out there. Once you are aware of all of the domains matching your brand, you can speed up the process by constraining your search to just the last 24 hours and running the search at a regular interval within the time period.

Brand Watch

Brand Watch is a python application which implements the methods described in this blog post. You can access its source here:

  • https://github.com/brad-anton/brand_watch

Running it is simple:
Brand Watch

Excluding domains

To exclude certain domains you have already investigated, provide a text file to the -e command line argument and they won’t be shown:
Excluding hosts
Now you can set this up as an upstart task or cron job to detect new domains—you could even have it shoot off a daily email if you were so inclined 🙂
Enjoy!

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2021 Cisco Umbrella