Threat analysts at Palo Alto Networks (Unit 42) discovered that the phenomenon of ‘domain shadowing’ might be more prevalent than previously thought, uncovering 12,197 cases while scanning the web between April and June 2022.

Domain shadowing is a subcategory of DNS hijacking, where threat actors compromise the DNS of a legitimate domain to host their own subdomains for use in malicious activity but do not modify the legitimate DNS entries that already exist.

These subdomains are then used to create malicious pages on the cybercriminals’ servers while the domain owner’s site’s web pages and DNS records remain unchanged, and the owners don’t realize they have been breached.

In the meantime, the threat actors are free to host C2 (command and control) addresses, phishing sites, and malware-dropping points, abusing the good reputation of the hijacked domain to bypass security checks.

The attackers can theoretically change the DNS records to target users and owners of the compromised domains, but they typically prefer to take the stealthy path described above.

Hard to detect

Unit 42 explains that detecting real cases of domain shadowing is particularly challenging, which makes the tactic so alluring for the perpetrators.

The analysts mention that VirusTotal marked only 200 domains as malicious out of the 12,197 domains Palo Alto’s detectors uncovered.

Most (151) of the VirusTotal detections were related to a single phishing campaign using a network of 649 shadowed domains on 16 compromised websites.

“We conclude from these results that domain shadowing is an active threat to the enterprise, and it is hard to detect without leveraging automated machine learning algorithms that can analyze large amounts of DNS logs.” – Unit 42

Furthermore, phishing pages hosted on domains with a good reputation would appear trustworthy to a visitor, causing them to more likely to submit data on the page.

Shadowing phishing campaign

The phishing campaign discovered by Palo Alto’s researchers compromised 16 domains to create 649 subdomains, hosting bogus login pages or redirection points to phishing pages.

Examples of malicious subdomains and breached domains
Examples of malicious subdomains and breached domains (Unit 42)

The subdomains that redirect to the phishing sites can easily bypass email security filters as they don’t host anything malicious and have a benign reputation.

The threat actors target Microsoft account credentials, and while the URL is clearly not related to Microsoft, it won’t trigger warnings from internet security tools.

Landing page receiving redirections from snaitechbumxzzwt.barwonbluff[.]com.au
Landing page receiving redirections from “snaitechbumxzzwt.barwonbluff[.]com.au” (Unit 42)

In one case, the domain owners realized the compromise, but not before numerous subdomains had been created and facilitated malicious operations on their infrastructure.

Compromised site realizing the breach
Compromised site realizing the breach (Unit 42)

While protection from rogue subdomains is the responsibility of domain owners, registrars, and DNS service providers, it would be prudent for users always to be wary when submitting data.

This includes the possibility that a subdomain on a well-known domain can be malicious and for users to double-check everything before they submit credentials or other sensitive information.

Recent Posts

A Quick Guide to Windows 11 22H2’s Phishing Protection Tool

Windows 11's 22H2 update introduces a phishing protection tool that can warn...
Read More

Protect Your Organization from Outlook Phishing Attack using External Email Tagging

Phishing attacks are the top cybersecurity attacks in recent days. According to...
Read More

Energy crisis IT impact

The European Commission (EC) has set out plans to curb rising energy...
Read More

IBM launches fourth-gen LinuxONE servers

IBM LinuxONE Emperor 4 server uses the System Z processor and boasts...
Read More

Single-core vs. multi-core CPUs

Some apps need CPU clock speed while others need multiple cores, so...
Read More

Domain shadowing becoming extreme popular among cyber criminals

Threat analysts at Palo Alto Networks (Unit 42) discovered that the phenomenon...
Read More

Cloud computing security risks and the common pitfalls

As more companies rely on cloud-based technology, particularly because remote working is...
Read More

Windows 11 22H2 is released, here are the new features

Microsoft has released the next version of Windows 11 called "22H2," otherwise...
Read More

Sharing our Machine Learning Model for YouTube Video Similarity

Today we are pleased to announce that the YouTube video similarity models...
Read More
Search here...