Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Vulnerabilities Emerge as Cybercriminals Exploit Forgotten Domains to Evade Security Measures



New vulnerabilities have emerged as cybercriminals exploit neglected domains to evade security measures, posing significant threats to individuals, businesses, and the public at large. Cybersecurity experts warn that awareness and training are essential in combating these evolving threats, highlighting the need for regulatory bodies and industry leaders to collaborate more effectively in establishing better standards for protecting digital communications.

  • Cybercriminals are using neglected domains to evade SPF and DMARC security protections.
  • Phishing campaigns with spoofed sender addresses are created using these old domains.
  • Spoofed domains often lead to phishing sites containing malicious attachments or links.
  • Popular brands like Amazon and Mastercard are impersonated in phishing attacks.
  • QR codes and traffic distribution systems (TDSes) are used to evade detection by security systems.
  • Sophisticated social engineering schemes impersonate government officials and exploit victims' trust.
  • Threats pose a significant threat to individuals, businesses, and the public at large.


  • Cybersecurity researchers have made a disturbing discovery that threatens the security of email communications and highlights the evolving tactics of malicious actors. The data reveals that cybercriminals are using neglected domains to evade SPF (Sender Policy Framework) and DMARC (Domain-based Message Authentication, Reporting and Conformance) security protections. These forgotten domains, which have not been used to host content for nearly 20 years, have become a haven for spammers.

    According to the analysis conducted by DNS threat intelligence firm [insert company name], threat actors, including Muddling Meerkat and others, have exploited these old domains to create phishing campaigns that aim to deceive recipients into revealing sensitive information. The most common tactic employed is to make the sender address appear more legitimate in order to bypass security checks.

    The research also highlights the fact that some of these neglected domains are short and highly reputable top-level domains (TLDs). This makes it easier for spammers to create convincing email messages with spoofed sender addresses, which often lead to phishing sites containing malicious attachments or links. The most common domain abuse detected in this analysis includes:

    ak@fdd.xpv[.]org
    mh@thq.cyxfyxrv[.]com
    mfhez@shp.bzmb[.]com
    gcini@vjw.mosf[.]com
    iipnf@gvy.zxdvrdbtb[.]com
    zmrbcj@bce.xnity[.]net
    nxohlq@vzy.dpyj[.]com

    Furthermore, the researchers discovered that phishing sites impersonate popular brands such as Amazon and Mastercard to steal users' credentials. The threat actors also employ QR codes in their campaigns which link back to fake login pages, utilizing traffic distribution systems (TDSes) to make it more difficult for security systems to detect these sites.

    Another type of campaign observed was one that impersonated the U.S. Social Security Administration and tricked victims into installing malicious software on their computers. These attacks utilize tactics such as phishing emails and embedded links in an attempt to deceive users, exploit user trust and get them to cooperate by submitting information via compromised websites or mobile apps.

    In addition, SMS phishing campaigns were observed impersonating law enforcement authorities in the U.A.E., prompting victims to pay non-existent traffic violations and license renewals. Banking customers in the Middle East have also been targeted with a sophisticated social engineering scheme that impersonates government officials over phone calls and employs remote access software to steal credit card information and one-time passwords (OTPs).

    These campaigns, which often target female consumers who have previously submitted commercial complaints to government services portals, exploit victims' willingness to cooperate and obey instructions in order to receive refunds for unsatisfactory purchases.

    The study also points out that threats such as these pose a significant threat to individuals, businesses, and the public at large. The exploitation of neglected domains allows spammers to stay one step ahead of security measures, making it increasingly difficult to protect email communications from cyber threats.

    The implications of this discovery are clear: cybersecurity awareness is essential in combating such campaigns. Individuals must remain vigilant when receiving unsolicited emails or messages, while businesses and organizations should ensure that their employees receive regular training on phishing detection and cybersecurity best practices. Furthermore, regulatory bodies and industry leaders need to collaborate more effectively to establish better standards for protecting digital communications from cyber threats.

    In conclusion, this analysis highlights the evolving tactics employed by malicious actors in exploiting forgotten domains to bypass security measures. It serves as a stark reminder of the importance of staying informed about emerging threats and taking proactive steps to protect oneself and others from falling victim to these attacks.

    Related Information:

  • https://thehackernews.com/2025/01/neglected-domains-used-in-malspam-to.html

  • https://blog.knowbe4.com/phishers-abusing-neglected-domains-pass-dmarc


  • Published: Wed Jan 8 13:44:01 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us