当多样性遭遇敌意:网上银行域名抢注滥用研究

Neeraj Kumar, Sukhada Ghewari, Harshal Tupsamudre, Manish Shukla, S. Lodha
{"title":"当多样性遭遇敌意:网上银行域名抢注滥用研究","authors":"Neeraj Kumar, Sukhada Ghewari, Harshal Tupsamudre, Manish Shukla, S. Lodha","doi":"10.1109/eCrime54498.2021.9738769","DOIUrl":null,"url":null,"abstract":"In today’s digital era, a large number of users rely on banking websites to perform financial transactions. The widespread adoption of online banking and the monetary value associated with each user account make banking websites a potential target for domain squatting. Domain squatting is a common practice in which malicious actors register internet domain names which are similar to popular domains. In this work, we study the prevalence of domain squatting abuse that exploits inconsistent internet domain names used by popular banks across several countries including US, UK, Australia, Germany, China and India. An attacker exploits the inconsistencies present in the domain names to generate similar looking domains and use them for malicious purposes such as domain takeover, malware propagation, click fraud, phishing, stealing traffic, distribution of ads and malware.In this paper, we present the first context-free grammar (CFG) based algorithm that models inconsistencies in domain names of banking websites and use it to generate candidate domains. We also provide a comprehensive categorization technique to classify candidate domains into four different categories: defensive, malicious, suspicious and unrelated. Our study reveals that more than 3,000 domains that are either malicious or suspicious, targeting popular banks across different countries around the world. Further, we noticed prevalence of three forms of domain squatting, namely comboTLDsquatting, full-name squatting and brandname squatting. We found that most of the malicious and suspicious domains are instances of comboTLDsquatting. Our work shows that only few organizations are protecting their brands against domain squatting abuse by performing defensive registration. Further, our study identified different strategies used by malicious actors during domain registration in order to evade detection from security researchers and trick victims into disclosing their credentials. In particular, we discover that malicious actors use similar words, same TLDs, grammar rules and registrar for registering domains which are used in benign domains.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"When Diversity Meets Hostility: A Study of Domain Squatting Abuse in Online Banking\",\"authors\":\"Neeraj Kumar, Sukhada Ghewari, Harshal Tupsamudre, Manish Shukla, S. Lodha\",\"doi\":\"10.1109/eCrime54498.2021.9738769\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s digital era, a large number of users rely on banking websites to perform financial transactions. The widespread adoption of online banking and the monetary value associated with each user account make banking websites a potential target for domain squatting. Domain squatting is a common practice in which malicious actors register internet domain names which are similar to popular domains. In this work, we study the prevalence of domain squatting abuse that exploits inconsistent internet domain names used by popular banks across several countries including US, UK, Australia, Germany, China and India. An attacker exploits the inconsistencies present in the domain names to generate similar looking domains and use them for malicious purposes such as domain takeover, malware propagation, click fraud, phishing, stealing traffic, distribution of ads and malware.In this paper, we present the first context-free grammar (CFG) based algorithm that models inconsistencies in domain names of banking websites and use it to generate candidate domains. We also provide a comprehensive categorization technique to classify candidate domains into four different categories: defensive, malicious, suspicious and unrelated. Our study reveals that more than 3,000 domains that are either malicious or suspicious, targeting popular banks across different countries around the world. Further, we noticed prevalence of three forms of domain squatting, namely comboTLDsquatting, full-name squatting and brandname squatting. We found that most of the malicious and suspicious domains are instances of comboTLDsquatting. Our work shows that only few organizations are protecting their brands against domain squatting abuse by performing defensive registration. Further, our study identified different strategies used by malicious actors during domain registration in order to evade detection from security researchers and trick victims into disclosing their credentials. In particular, we discover that malicious actors use similar words, same TLDs, grammar rules and registrar for registering domains which are used in benign domains.\",\"PeriodicalId\":228129,\"journal\":{\"name\":\"2021 APWG Symposium on Electronic Crime Research (eCrime)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 APWG Symposium on Electronic Crime Research (eCrime)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/eCrime54498.2021.9738769\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 APWG Symposium on Electronic Crime Research (eCrime)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/eCrime54498.2021.9738769","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在当今的数字时代,大量用户依靠银行网站进行金融交易。网上银行的广泛采用以及与每个用户账户相关的货币价值使银行网站成为域名抢注的潜在目标。域名抢注是恶意行为者注册与常用域名相似的互联网域名的一种常见做法。在这项工作中,我们研究了域名抢注滥用的流行程度,这种滥用利用了包括美国、英国、澳大利亚、德国、中国和印度在内的几个国家的热门银行使用的不一致的互联网域名。攻击者利用域名中的不一致性来生成相似的域名,并将其用于恶意目的,例如域名接管,恶意软件传播,点击欺诈,网络钓鱼,窃取流量,广告和恶意软件的分发。在本文中,我们提出了第一个基于上下文无关语法(CFG)的算法,该算法对银行网站域名的不一致性进行建模,并使用它来生成候选域名。我们还提供了一种全面的分类技术,将候选域分为四种不同的类别:防御性、恶意、可疑和不相关。我们的研究显示,有超过3000个恶意或可疑的域名,目标是全球不同国家的热门银行。此外,我们注意到三种形式的域名抢注盛行,即组合域名抢注、全称抢注和品牌抢注。我们发现大多数恶意和可疑域名都是comboTLDsquatting的实例。我们的工作表明,只有少数组织通过执行防御性注册来保护其品牌免受域名抢注的滥用。此外,我们的研究确定了恶意行为者在域名注册期间使用的不同策略,以逃避安全研究人员的检测并欺骗受害者披露其凭据。特别是,我们发现恶意行为者使用类似的单词,相同的tld,语法规则和注册商来注册良性域名中使用的域名。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
When Diversity Meets Hostility: A Study of Domain Squatting Abuse in Online Banking
In today’s digital era, a large number of users rely on banking websites to perform financial transactions. The widespread adoption of online banking and the monetary value associated with each user account make banking websites a potential target for domain squatting. Domain squatting is a common practice in which malicious actors register internet domain names which are similar to popular domains. In this work, we study the prevalence of domain squatting abuse that exploits inconsistent internet domain names used by popular banks across several countries including US, UK, Australia, Germany, China and India. An attacker exploits the inconsistencies present in the domain names to generate similar looking domains and use them for malicious purposes such as domain takeover, malware propagation, click fraud, phishing, stealing traffic, distribution of ads and malware.In this paper, we present the first context-free grammar (CFG) based algorithm that models inconsistencies in domain names of banking websites and use it to generate candidate domains. We also provide a comprehensive categorization technique to classify candidate domains into four different categories: defensive, malicious, suspicious and unrelated. Our study reveals that more than 3,000 domains that are either malicious or suspicious, targeting popular banks across different countries around the world. Further, we noticed prevalence of three forms of domain squatting, namely comboTLDsquatting, full-name squatting and brandname squatting. We found that most of the malicious and suspicious domains are instances of comboTLDsquatting. Our work shows that only few organizations are protecting their brands against domain squatting abuse by performing defensive registration. Further, our study identified different strategies used by malicious actors during domain registration in order to evade detection from security researchers and trick victims into disclosing their credentials. In particular, we discover that malicious actors use similar words, same TLDs, grammar rules and registrar for registering domains which are used in benign domains.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信