Malicious Actors Weaponize 8,000 Domains & 13,000 Subdomains in a Phishing Operation
Phishing attacks have become a persistent threat, constantly evolving to bypass security measures. While traditional methods involve creating fake websites to lure victims, a recent large-scale campaign called "SubdoMailing'' sponsored by a malicious actor that goes by the name ResurrecAds, takes a different approach. This campaign, active since September 2022, has compromised over 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions including ACLU, eBay, Lacoste, Marvel, McAfee, MSN, Pearson, PwC, Swatch, Symantec, The Economist, UNICEF, and VMware.
Guardio Labs has uncovered this critical threat that exploits the very foundation of the internet's addressing system - the Domain Name System (DNS). The attackers exploit these domains to send out spam emails and generate revenue through clicks, leveraging the domains' credibility to bypass security measures like SPF, DKIM, and DMARC. These are email authentication methods designed to prevent domain spoofing. These emails are disguised as images to avoid spam filters. They then redirect users based on their device and location, potentially leading to phishing sites or malware.
How does SubdoMailing work?
SubdoMailing, a method leveraging compromised subdomains of legitimate websites to launch phishing campaigns and deceptive emails.
How CNAME records are exploited in SubdoMailing campaigns?
CNAME (Canonical Name) records are used in the Domain Name System (DNS) to map an alias domain name to a canonical domain name. They essentially act as pointers, directing users and applications to the actual location of a resource (like a website or email server) identified by the alias domain.
Attackers leverage CNAME records by identifying and registering long-abandoned subdomains that still hold CNAME entries pointing to legitimate domains. These outdated CNAME entries often reference forgotten domains that no longer actively serve any purpose. By registering the dormant subdomain, attackers inherit the behavior associated with the main domain, including its email authentication records like SPF.
How do attackers abuse SPF Authentication in SubdoMailing?
Sender Policy Framework (SPF) is an email authentication standard that allows domain owners to specify authorized servers permitted to send emails on their behalf. This helps prevent domain spoofing, where attackers forge email sender addresses to impersonate legitimate identities.
By inheriting the SPF record through the compromised subdomain's CNAME association, attackers bypass email security measures that rely solely on SPF authentication. Emails sent from the attacker-controlled subdomain appear to originate from the legitimate domain, allowing them to bypass spam filters and potentially deceive recipients.
领英推荐
The consequences of SubdoMailing Attacks
How can organizations prevent SubdoMailing attacks?
What makes email authentication protocols essential? Evasive Phishing Attacks Exploiting Accelerated Mobile Pages (AMP)
Implement Email Authentication Protocols with TDMARC
TDMARC simplifies the deployment and management of critical email authentication protocols such as SPF, DKIM, and DMARC, thereby defending your organization from SubdoMailing threats. Managing many email domains' SPF, DKIM, and DMARC records can be time-consuming and error-prone.