But before we get to that, here’s an important observation: Domain correlation is pretty cool. It’s so cool that we created a 3D visualization to demonstrate it:
A browser hijacker is the type of malware which alters your device’s browser settings so that you are redirected to web sites that you had no intention of visiting. It is an old, and yet very prevalent problem today.
Looking at the hoffmeister.be data (yes, our previously identified attacker fixed a typo in the TLD) and recent attempts at large-scale amplification attacks, I noticed a surprising absence of spoofed source addresses. My first thought was that the ISP forces the correct IP onto packets entering the network, but that is not common practice (illegal source address packets are dropped if you implement BCP38, SAVI and/or unicast RPF).
We see a lot of DNS amplification attacks, so we’re rarely impressed by them.
Today was different.
As the investigation of the WannaCry ransomware keeps evolving, more evidence is revealed and more theories are suggested. While analyzing the DNS and HTTP traffic of domains and clients involved in WannaCry we made several useful discoveries, which may shed some additional light on this cybercrime.
A recent DDoS attack against Cedexis, a French service provider, caused many prominent French newspapers, including Le Monde, Le Figaro, L’Equipe, Le Nouvel Observateur, all hosted on Cedexis network, to briefly shut down yesterday, May 10. Other web services built on Cedexis network has been affected as well.
Ransomware is grabbing a lot of headlines lately given the increasing frequency with which these attacks occur. One prominent form of this advanced cyberthreat is Locky, which we first wrote about almost one year ago. After our initial blog post we saw Locky mostly disappear – at least momentarily. It then came back about three weeks later, but given our broad view of DNS queries from communications service provider (CSP) networks around the globe, we were quickly able to detect the new activity.
Today a new phishing attack began making the rounds in email boxes around the world, taking the form of an email with a link to a Google Doc that the sender has shared with the recipient. The email looks innocent enough, as shown in the image below – I myself received one shortly after the attack was launched – and many people will likely click the link out of curiosity to see what they received.
Today we’re launching a new security and data science blog where we’ll discuss technical topics and share insights from our expert Security and Data Science team here at Nominum. As the leader of this team, I’m excited to have this blog be a way to share some of our findings with a more technical audience—people who love cybersecurity, data, DNS, and all the exciting new developments on the internet (and who doesn’t?).