Incidents

New gTLDs, same attacks

Cybercriminals around the world have already started to point their guns and attacks at the new gTLDs, the ‘generic Top Level Domains’ approved by ICANN and offered by registrars to people interested in buying a new domain name. Recently we found malicious activities including malware and phishing pages registered in the top level domains .club, .berlin, .blue, .computer, .camera, .futbol, .link, .pink, .report, .travel, .vacations and .xyz.

The new gTDLS were recently approved by ICANN and registrars are already offering them as a solution to those bored with the traditional .com or .org and who want more possibilities when registering internet domains. You should be prepared to see websites like”funny.dance“or “joe.dentist“or even “my.creditcard“.

According nTLDStats.com, more than 1.4 million domains have already been registered using these new gTLDs:

1

There are now more than 322 new top level domains granted by ICANN, among these the most popular are .xyz (designated at Feb. 2014), .berlin and .club (both designated in January 2014):

2

Brazilian phishers and domains squatters are particularly interested in these new gTLDs, already having registered several new domains using names of local brands such as banks, online stores, and credit card companies. For example:

  • cielo-seucartaobateumbolao.xyz
  • megasaldao-americanas.xyz
  • lojadoricardoeletro.xyz
  • hsbc.club
  • santander.club
  • bradesco.club
  • ricardoeletro.club
  • ricardoeletro.computer
  • ricardoeletro.camera

These domains were registered with the intention of being used for phishing campaigns, so it comes as no surprise that the data registered in the respective “whois” databases is completely fake:

3

Malware is also involved. We’re aware of bad guys hosting their exploit kits in such domains – the Nuclear Exploit Pack is currently using the .blue, .pink, .futbol, and .report gTLDs, as pointed out by security researcher Frank Denis.

But Brazilian bad guys aren’t the only ones interested in the new gTLDs as English-speakers have showcased similar interests by already starting a fraudulent domain that sells coins for online games such as Fifa ’14 and others.

4

Other phishers already started their phishing campaigns, even using older TLDs such as .travel (started in 2005). As you can see in the following abused domain that hosts a phishing page aimed at a Brazilian bank:

5

If you’re a regular user, be aware of such links appearing in email messages or in social networks – they can be just as dangerous as others links. If you’re a company, it’s a great idea to start a brand monitoring process to insure that your company name or brand aren’t being used in campaigns involving these new TLDs.

Kaspersky users are protected against all of these attacks.

New gTLDs, same attacks

Your email address will not be published. Required fields are marked *

 

Reports

The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox