
Happy Spring! We’re pleased to share the latest edition of the DomainTools Report. We have compiled information regarding domain registration, hosting, and content-related data since 2015 in an effort to surface patterns and trends that may be beneficial to researchers, security practitioners, and others who are interested in the suspicious or malicious use of online infrastructure.
In the past several editions, we focused on concentration of malicious activity by six categories, which we resume in this current edition, including:
We focus on these features as they’re often used by defenders and security researchers as part of a process of building out a better understanding of a domain. Seasoned practitioners often develop intuitions about the implications of a given feature, based on their experience, expertise, and judgment in the analysis of adversary assets.
In many cases, the data seen at scale tend to support those intuitions. Certain TLDs, for example, have reputations among security analysts as being dangerous “neighborhoods” of the Internet, and as this and previous DomainTools Reports show, there are indeed some TLDs that have high concentrations of malicious domains. Other criteria are more ambiguous, such as the aforementioned SSL CAs.
There were two components used to determine which of the candidate domains represented threats.
A high signal strength value means that the concentration of malicious domains associated with that characteristic is high. When we know that a large proportion of the domains in a given population (an IP address, a name server, a registrar, etc) is malicious, this raises our confidence that any unknown domain from that population is relatively likely to be involved in the threat in question. Basically, if a feature has more than “its fair share” of malicious domains, compared to the overall average, its signal strength is elevated.
For this report, we took a snapshot of the domains in existence and active as of mid March 2024.
We’re going to give you a small teaser of some of the interesting data from this edition of the report, but of course we invite you to take a deep dive and read the full report itself.
By evaluating domain characteristics including Top Level Domains, SSL Certificate Authority, and IP Geolocation, DomainTools uncovered multiple patterns of malicious infrastructure across the Internet. For example, our analysis of IP geolocation has unearthed key findings, including:
This is the third iteration of the DomainTools Report to include this specific collection of features in the data snapshot. We intend to glean trending information about the evolving nature of concentrations of malicious activity across the Internet. We may continue to make small adjustments to our thresholding methodology in order to give what we judge to be the most useful insights.
We hope this and future editions benefit others like ourselves who are passionate about making the Internet a safer place and work to give bad actors more bad days. Drop us a line and let us know what you think.
Review Trends in Malicious Infrastructure
Look no further, the full Spring 2024 Report can be found here.