
When we talk about investigating bad domains, our focus is often on identifying starting clues or amplifying those starting clues by finding productive pivots in Iris Investigate, DNSDB or related tools. What often goes undiscussed is what happens after you’ve actually identified a set of bad domains. There may often simply be silence once that point in the process has been attained. But why?
Whatever the reason, this blog is going to say a little about “what often happens next.”
In general, there are three main approaches to handling bad domains, one technical, one involving attorneys, and one involving sworn LEOs (law enforcement officers).
Technical people tend to prefer to employ technical responses to online security issues, and in truth, many times may be your only practical option. Generally speaking, technical responses to network security issues often involve blocking unwanted traffic.
Example A) Imagine you’re doing log analysis on an Internet-exposed server. That server has logged repeated login failures on port 22/TCP, the SSH (secure shell) port. We know that when an Internet-exposed SSH daemon gets found by a scanner, that attacker will then routinely proceed to try brute force password guessing attacks against that box. That’s likely what’s going on in this case. But to respond? This sort of behavior has become so common that many analysts simply encourage the target of those attacks to:
Note that DNSDB (or another passive DNS product) is not required for this example — the response process is all IP-address driven. Passive DNS may NOT “always be the answer.”
Example B) Another common problem? Volumetric distributed denial of service (DDoS) attacks. In that case, attackers attempt to flood a site’s connection to the Internet by flooding those “pipes” with unsolicited junk traffic.
If you encounter a volumetric DDoS, that unwanted traffic needs to be “scrubbed” (filtered) by your upstream network provider(s) before it can swamp your transit links. By the time that unwanted traffic touches a network you control (or that traffic gets blocked by your perimeter firewall), it will be “too late” for any action you can directly take — that flood of traffic will already have consumed your transit bandwidth capacity. So again, DNSDB (or some other passive DNS solution) isn’t the “answer” for blocking DDoS attack traffic, either.
Example C) Other times, however, there are DNS-based options that can help technically filter unwanted traffic. For example, some sites use Response Policy Zones to create a “DNS firewall.” For those who may not be familiar with Response Policy Zones (RPZs), they work by telling a site’s local recursive resolver to “lie” about specified sites, claiming they can’t be resolved, thereby keeping users from accidentally going to a site they can’t safely visit. RPZ files may come pre-built from commercial cyber security companies, from collaborative community information sharing efforts, or may be constructed in-house from directly observed data (and/or additional data found by leveraging DNSDB).
Simply “putting your shields up” and blocking unwanted network traffic may feel like a very defensive cyber security posture — and it is.
When we begin to look at going beyond “strictly-defensive responses,” some people may begin to fantasize about “hacking back,” or “counter attacking” those who’ve attacked them. We strongly urge you to NOT adopt that approach for several reasons, including:
So, what, if anything, MIGHT end up being done as an acceptable “technical” response to something like an infringing “knock-off merchandise” site? One commonly mentioned objective is to get the infringing site taken down. Infringing sites actually require a surprisingly large number of resources/services, including:
In an ideal world, suppliers of those services would prevent them from being used for infringing purposes. If that happened, an infringing site would never be able to be created and brought online in the first place.
Unfortunately, there ARE providers who are completely disinterested in what their customers do “as long as the check clears” (and law enforcement officers aren’t at the door ready to seize business records and equipment). These providers are all too often participants in a “race-to-the-bottom” on price, and lack the revenue for even know-your-customer (“KYC”) onboarding programs, much less an abuse department to handle complaints received from 3rd parties after the customer has gone live.
The bad folks talk amongst themselves about which providers enforce strict terms of service and which don’t, sharing data about what any given provider will let customers get away with.
There are even providers who knowingly SPECIALIZE in servicing the needs of cyber criminals, ignoring any resulting complaints as long as that customer is willing to pay a premium price for “covered ears and closed eyes.”
What does this mean to a defender trying to get an infringing site taken offline? Convincing service providers to voluntarily terminate service to a paying customer may be difficult. Some providers will do so in order to avoid being blocklisted by Spamhaus or other block list operators. Others will only do so if forced to do so by a court order — and by that point the offender may have achieved their objectives and moved on to a new provider, using new domain names, etc., what some people succinctly describe as “lather, rinse and repeat.”
But let’s assume you’re tenacious, and you have a legal team that repeatedly gets infringing sites taken down. What then?
This means that, fortunately, the dark web will only work as a viable alternative for a narrow slice of “highly motivated” sellers and buyers.
Most cybercriminals, however, find their lowest-cost/easiest-to-implement/most successful options continue to involve selling actual retail consumer products via conventional domain name registrations, leveraging conventional authoritative DNS services, conventional web hosting, conventional payment channels, etc. The bad guys will continue to use the simplest and cheapest technology that they can “get away with” using.
The good news is that as long as this is true, defenders will continue to be able to at least theoretically take advantage of:
The biggest problem with these and similar processes is their inherent “asymmetry:”
If the above seems exhausting (and more than you want to have to figure out and fight with yourself!), there’s a convenient option that many may find attractive: outsource handling of potentially-problematic domains you’ve discovered to third party specialty service providers.
“Here. We’ve found the site . It looks bad to us. Please investigate and handle it appropriately. Bill our account. Thanks.”
Why is this an attractive option? Well, most companies prefer to focus on their core competency, while outsourcing miscellaneous functions to those who’ve chosen to specialize in those areas. For example, a manufacturer of luxury consumer products may be excellent at making and marketing those luxury goods, but may not have the in-house expertise needed to effectively tackle cyber criminals. They may prefer to outsource that work to a 3rd-party specializing in brand protection or trademark enforcement, instead.
This “buy rather than build” decision is often ultimately the result of multiple factors:
Some categories of online content are the exclusive responsibility of sworn law enforcement officers or other entities designated by statute. For example, incidents involving online child sexual abuse materials (“CSAM”) are the responsibility of:
Anyone encountering CSAM online should immediately report that discovery to appropriate authorities. NEVER attempt to investigate CSAM yourself!
Another example of an area where the authorities may be interested and active is online drug sales.
Generally, you shouldn’t need to worry about getting your reporting to the right agency. Appropriate referrals (and deconfliction with already-ongoing operations, if any) will be handled cooperatively by the relevant agencies once you’ve made your initial report.
Not sure who to report fraud cases and other miscellaneous Internet crimes to? One excellent option is the FBI’s Internet Crime Complaint Center (IC3)
Just like conventional “bricks-and-mortar” crimes, which all-too-often go unreported and unsolved, nothing may appear to be happening when suspected-to-be-bad domains are uncovered and reported to the authorities. This may be the result of:
Other times it may appear that nothing is happening while progress actually is being made, it just may be happening “slowly and steadily” with no visibility/transparency into that progress for you.
To understand why this occurs, you need to know that investigators may be forbidden from sharing the status of their investigations with any outsiders, even if the “outsider” happens to be a victim or an initial reporting party.
Investigations may also take months or even years of work to conclude as tedious processes play out.
In the face of that lack of visibility, patience — and sometimes even faith — may be required.
One other possibility to be aware of (most commonly in terrorism-related cases and organized crime-related cases), is that badness that’s been reported may INTENTIONALLY be “left up” so it can be monitored by the authorities for additional intelligence.
Leaving a known-bad site up might seem to be a counterintuitive thing to do, but remember that taking a bad site down might not stop what a bad group is doing (or planning to do). It may actually interfere with an ongoing investigation.
In fact, tearing down a bad site might force investigators to “start over from scratch.” Where did the bad guys go now? Can we discover their new location? Can we get new court orders to surveil that new site? Can we technically arrange to gain access to that new system or network? Or are we now effectively totally “blind?”
Sometimes you may just need to trust that your report is being handled in an appropriate way.
Identifying bad domains is just the first step in protecting your organization from cyber threats. By combining technical, legal, and law enforcement approaches, you can effectively mitigate the risks associated with these malicious domains. Implementing robust network security measures, engaging legal counsel, and collaborating with law enforcement agencies are all critical components of a comprehensive defense strategy.
Remember, proactive monitoring and swift action are key to staying ahead of cybercriminals. By leveraging domain and DNS intelligence, you can detect and respond to threats more efficiently, safeguarding your organization’s assets and reputation.
If you have any questions or need further assistance, don’t hesitate to reach out to cybersecurity experts or consult additional resources to enhance your defense mechanisms. Together, we can create a safer digital environment for everyone.
Original Post Published 05/12/2022