featured image, abstract image
Blog Farsight TXT Record Federal Government

These Days Some Of The Bad Guys Are Even Spoofing FBI-Related Domain Names...

“You don’t tug on Superman’s cape
You don’t spit into the wind
You don’t pull the mask off that old Lone Ranger
And you don’t mess around with Jim…”

“You Don’t Mess Around With Jim”— Jim Croce

I. Introduction

Farsight has previously discussed the problem of spoofed domains in its blogs, see for example:

Unfortunately, spoofed domains remain an everyday occurrence, an ugly reality for

  • Banks
  • Payment card companies, or
  • Brand owners targeted by “knock off” merchandise-sellers.

Yet brands are not the only victims of this type of attack. Federal law enforcement agencies have also been targets. For some people, this is difficult to understand because:

  • Most Americans want to help the good guys win.
  • Most of us have been trained since birth to comply with police officers, particularly Federal agents. If a Federal agent makes a demand, most people will instinctively comply.
  • Many Americans believe the FBI only investigates the most serious of crimes, which further adds to the perceived gravity of an investigation allegedly involving an FBI agent.
  • And so on.

The result is that the spectre of interacting with “the FBI” is potent — when the Federal Bureau of Investigation (or someone claiming to the be the FBI) speaks, most of us will listen and then obey. That’s exactly the response bad guys want. And that may be one reason why the bad guys have begun to spoof FBI-related domain names.

For example, yesterday the FBI released Public Service Announcement I-112320-PSA “Spoofed FBI Internet Domains Pose Cyber and Disinformation Risks.

That report lists over 90 domains attempting to spoof the FBI, and notes “This list is not comprehensive but demonstrates the range of spoofed domains that exist.”

There are indeed many other likely-spoofed FBI domains, as we’ll show later in this blog article.

Targeting the nation’s premier law enforcement agency seems like a pretty bold and foolhardy choice to us. It likely reflects an unwarranted sense of invulnerability on the bad guys part: “I can spoof whomever I want, and no one, not even the FBI, can stop me.” Maybe, but we doubt that’s true. As the Jim Croce song goes, “You don’t mess around with Jim,” to which I’d add “And you really don’t want to mess around with the FBI.”

So why this article? Well, we have several motivations:

  • We want to echo the FBI’s warning — spoofed domains ARE an ongoing problem on the Internet, and every end-user needs to be very careful to avoid mistakenly trusting easily-misread (or intentionally misleading) domains.
  • We want to show you how to get a list of domains that contain “FBI”, as seen by Farsight’s new DNSDB Flexible Search service.
  • We want to explain why the FBI can’t simply block or seize all domains that contain the string “FBI”.

II. How Can This Have Even Have Become A Problem?

Let’s begin by explaining why sites such as the FBI run into problems with spoofed domains. The reasons are numerous, including:

  • Domains are cheap and easy to register, and can be used as soon as the domain is registered, no waiting period required. On the other hand, even when pushing really hard, it can take defenders hours or even days to get an evil new domain taken down.
  • Whois privacy and proxy services, as well as wholesale (and over-applied!) GDPR redactions reduce the usability of Whois, and complicate attribution and accountability when domain name abuse occurs.
  • Email clients and web browsers often try to “help” make the Internet “more friendly” by concealing actual network email addresses and website URLs, showing just “formatted email names” or “formatted web site names.” When this happens, if you see something that sounds or feels wrong to you, you may need to inspect the raw source code for a message or web page to see what’s REALLY going on.
  • Everyone’s just so dang busy!

III. Quantitatively, Just How Bad Is The “FBI” Domain Spoofing Problem?

The FBI PSA mentioned 92 domains in their alert, but Farsight DNSDB customers who use Farsight’s new Flexible Search can get a more comprehensive view of the domains that may be spoofing “FBI”.

Let me show you using dnsdflex, Farsight’s new commandline Flexible Search client.

To keep this manageable and relatively current, we’ll limit our search to just domains seen during the last 90 days. Our initial run will return up to a million unique fully qualified domain names (FQDNs). Because some FQDNs may actually return multiple record types, in this case we actually ended up with OVER a million results returned.

$ dnsdbflex --regex fbi -A90d -l0 -j > fbi-domains.txt
$ wc -l fbi-domains.txt
1039751 fbi-domains.txt

Because there appear to be potentially more than a million results, we’ll ask for a second followup tranche of results, offset by a million results from our initial results:

$ dnsdbflex --regex fbi -A90d -l0 -j -O 1000000 >> fbi-domains.txt
$ wc -l fbi-domains.txt
1312221 fbi-domains.txt

We’ll then extract just the RRnames from each record, and check to see how many unique ones we’ve found:

$ jq -r '.rrname' < fbi-domains.txt | sort -u > fbi-domains-2.txt
$ wc -l fbi-domains-2.txt
1237271 fbi-domains-2.txt

So now we see is that there are nearly 1.24 million unique domains that include “FBI” somewhere in the FQDN. Are these domain names ALL malicious, or at least suspicious?

First of all, remember that Farsight DOESN’T call good or bad. YOU need to decide if a given domain is suspicious or bad.

Secondly, many domains may only “coincidentally” have “FBI” as part of the FQDN — the shorter the string you’re matching, the greater the probability that you’ll see essentially-irrelevant random matches.

As a first pass, let’s trim the hostname part of the names we’ve discovered (the 2nd-level-dom script we’re using to trim the names is available in Appendix I):

$ 2nd-level-dom < fbi-domains-2.txt | sort -u > fbi-domains-3.txt
$ wc -l fbi-domains-3.txt
57752 fbi-domains-3.txt

So from the above, we can see that after removing the hostname part, we have nearly 58,000 unique domains. Some of those domains may no longer mention “FBI” at all, however, if “FBI” was only in the hostname part. Let’s check to see how many still “qualify” for further scrutiny:

$ grep fbi fbi-domains-3.txt > fbi-domains-4.txt
$ wc -l fbi-domains-4.txt
32621 fbi-domains-4.txt

Once we’ve dropped the hostname part, “only” 32,621 of the effective 2nd-level domains have the string “FBI”.

Many of those domains may NOT be intentionally spoofing the FBI. Sometimes the “FBI” string will just appear coincidentally in a name. For example:

typesofbikes[dot]com
veincenterofbirmingham[dot]com
wolfbitefiberworks[dot]com

Other domains may have what looks like random gibberish, part of which may randomly include the magic “FBI” string:

085a5028qzt2f4gitwqlg7nvxvfbiw2m.ui.nabu[dot]casa
mbhcgjmmmpucoobparparoidgrchfbih[dot]cf
env5bad4680f0ab2-jyjbfbi-5hjvrechjbdrc.us-3.magentosite[dot]cloud
8yzwepmenhfbijnds6[dot]cn

So how can we find the “real” domains of concern that may be targeting the FBI? We can try using Flexible Search’s regular expression features. We’ll look for domains from the last 90 days that match one of the following patterns:

a) Let’s try looking for domain names that start with FBI followed by a literal dot:

$ dnsdbflex --regex '^fbi\.' -A90d -l0 -j > fbi-start.txt
$ jq -r '.rrname' < fbi-start.txt | sort -u > fbi-start-2.txt
$ wc -l fbi-start-2.txt 
18231 fbi-start-2.txt

Those names include things that aren’t very interesting/aren’t likely meant to be misleading such as:

fbi.agilixbuzz[dot]com
fbi.agmfp.eu[dot]org
fbi.ags3.didiyunapi[dot]com

Let’s look at names that consist of just fbi followed by a dot followed by one more label (e.g., a TLD):

$ grep -v '\..*\..*\.' fbi-start-2.txt | sed 's/.$//' | sed
's/\./\[dot\]/' > fbi-start-3.txt
211 fbi-start-3.txt

Those look like:

fbi[dot]academy
fbi[dot]actor
fbi[dot]ae
fbi[dot]africa
fbi[dot]ag
fbi[dot]agency
fbi[dot]ai
fbi[dot]airforce
fbi[dot]am
fbi[dot]archi
fbi[dot]asia
fbi[dot]associates
fbi[dot]at
fbi[dot]attorney
fbi[dot]bar
fbi[dot]be
fbi[dot]best
fbi[dot]bet
fbi[dot]bi
fbi[dot]bike
​[etc]

If I were looking for intentional spoofing, I’d likely do a deep dive on all of the fbi. domains other than fbi.gov.

b) Domain names that include fbi followed by one of the other terms listed, excluding any names from the real fbi.gov domain:

$ dnsdbflex --regex  'fbi.*(agent|auth|bureau|crime|cyber|division|federal|fraud|gov|inspect|investigate|legal|official|police|unit|us|warning)' --exclude '\.fbi\.gov\.$'-A90d -l0 -j > fbi-at-beginning.txt
$ wc -l fbi-at-beginning.txt
73331 fbi-at-beginning.txt

Those 73.3K results will include both the name that was discovered AND the resource record type. Let’s just keep unique RRnames:

$ jq -r '.rrname' < fbi-at-beginning.txt | sort -u > fbi-at-beginning-2.txt
$ wc -l fbi-at-beginning-2.txt 
70875 fbi-at-beginning-2.txt

That takes us down to nearly 71K unique domans. Many of these don’t look like they’re intentionally meant to be misleading, e.g.:

affbizmall.exclusifvoyages.fr.jiajiaoban[dot]com
akali-cfbilling.inspectieszw[dot]nl
assetsmsfbiz.users.citymaps[dot]com

We think you’re now getting a sense of just WHY it can be so difficult to find potentially malicious “FBI” domain names — short patterns like “FBI” are prone to a LOT of overmatching.

IV. How About Searching For Something Longer/More Specific Patterns, Such As federalbureauofinvestigation

Let’s try searching for something quite a bit more specific, such as federalbureauofinvestigation. It is unlikely that such a specific string would appear “accidentally:”

$ dnsdbflex --regex 'federalbureauofinvestigation' -A90d -l0 -j > federal-bureau-of-investigation.txt
$ jq -r '.rrname' < federal-bureau-of-investigation.txt | sort -u > federal-bureau-of-investigation-2.txt
$ wc -l federal-bureau-of-investigation-2.txt
49 federal-bureau-of-investigation-2.txt

I think I find ALL of the following to be interesting domains that might merit further review:

admin.federalbureauofinvestigation[dot]org
americanfederalbureauofinvestigation[dot]com
autodiscover.umeshheendeniyavsfederalbureauofinvestigation[dot]org
cpanel.umeshheendeniyavsfederalbureauofinvestigation[dot]org
cpcalendars.umeshheendeniyavsfederalbureauofinvestigation[dot]org
cpcontacts.umeshheendeniyavsfederalbureauofinvestigation[dot]org
fbi-federalbureauofinvestigation[dot]com
federalbureauofinvestigation-govt.abuse-copyrightbangladesh[dot]com
federalbureauofinvestigation-govt[dot]com
federalbureauofinvestigation.5nx[dot]ru
federalbureauofinvestigation[dot]co.uk
federalbureauofinvestigation[dot]com
federalbureauofinvestigation[dot]info
federalbureauofinvestigation.listbb[dot]ru
federalbureauofinvestigation[dot]net
federalbureauofinvestigation[dot]nl
federalbureauofinvestigation[dot]org
federalbureauofinvestigation[dot]tk
federalbureauofinvestigationfbi[dot]com
federalbureauofinvestigations.duckdns[dot]org
federalbureauofinvestigations[dot]org
federalbureauofinvestigations[dot]us
federalbureauofinvestigationus[dot]tk
mail.umeshheendeniyavsfederalbureauofinvestigation[dot]org
mail.usafederalbureauofinvestigation[dot]com
post.federalbureauofinvestigation[dot]org
thefederalbureauofinvestigations.cbtechnicalacademy[dot]com
thefederalbureauofinvestigations.flipkeyprod[dot]net
thefederalbureauofinvestigations.manywho[dot]com
thefederalbureauofinvestigations.sf.gamedealing.com[dot]com
theusfederalbureauofinvestigations.campaignmonitor[dot]com
theusfederalbureauofinvestigations.canary1-sg3.omega.yahoo[dot]com
theusfederalbureauofinvestigations.everad[dot]com
theusfederalbureauofinvestigations.flipky[dot]com
theusfederalbureauofinvestigations.gamedealing.com[dot]com
theusfederalbureauofinvestigations.gap[dot]ae
theusfederalbureauofinvestigations.manywho[dot]com
umeshheendeniyavsfederalbureauofinvestigation[dot]org
usafederalbureauofinvestigation[dot]com
webdisk.umeshheendeniyavsfederalbureauofinvestigation[dot]org
webmail.federalbureauofinvestigation[dot]info
webmail.umeshheendeniyavsfederalbureauofinvestigation[dot]org
www.federalbureauofinvestigation-govt.abuse-copyrightbangladesh[dot]com
www.federalbureauofinvestigation[dot]com
www.federalbureauofinvestigation[dot]info
www.federalbureauofinvestigation[dot]org
www.federalbureauofinvestigationfbi[dot]com
www.umeshheendeniyavsfederalbureauofinvestigation[dot]org
www.usafederalbureauofinvestigation[dot]com

V. This Is Not Just An “FBI Thing”

While this blog article was couched around the FBI, since they’d sent out an alert highlighting spoofing of their domains, they’re not the only law enforcement agency whose name gets used in 3rd party domains. Remember, we’re NOT saying that any of the following domains ARE or ARE NOT “legitimate” (or ARE or ARE NOT a “problem”):

$ dnsdbflex --regex 'interpol' -A90d -l0 -j | jq -r '.rrname' | 2nd-level-dom | sort -u | grep 'interpol' > interpol-domains.txt

Selected domains from that search include:

canadapoliceinterpol[dot]com
crime-interpol[dot]com
cyber-interpol[dot]com
cyber-interpol[dot]tk
cyber-service-interpol[dot]com
cyber-service-interpol[dot]net
cybercrimeinterpol[dot]com
cyberinterpol[dot]com
cyberinterpol[dot]org
dutch-interpol[dot]com
fedinterpoldept[dot]net
globalinterpol[dot]com
iinterpol-int[dot]net
iinterpol[dot]cf
iinterpol[dot]com
iinterpol[dot]ga
iinterpol[dot]gq
iniinterpol[dot]fr
interpol-de[dot]org
interpol-europe[dot]com
interpol-fbi[dot]online
interpol-france[dot]com
interpol-france[dot]fr
interpol-gov[dot]cn
interpol-gov[dot]com
interpol-govgh[dot]in
interpol-hamburg[dot]com
interpol-ihnovation-centre.github[dot]io
interpol-iinnovation-centre.github[dot]io
interpol-ijnnovation-centre.github[dot]io
interpol-ijnovation-centre.github[dot]io
interpol-iknnovation-centre.github[dot]io
interpol-imnnovation-centre.github[dot]io
interpol-imnovation-centre.github[dot]io
interpol-inbnovation-centre.github[dot]io
interpol-inbovation-centre.github[dot]io
interpol-inhnovation-centre.github[dot]io
interpol-inhovation-centre.github[dot]io
interpol-injnovation-centre.github[dot]io
interpol-injovation-centre.github[dot]io
interpol-inmnovation-centre.github[dot]io
interpol-inmovation-centre.github[dot]io
interpol-inn0ovation-centre.github[dot]io
interpol-inn0vation-centre.github[dot]io
interpol-inn9ovation-centre.github[dot]io
interpol-inn9vation-centre.github[dot]io
interpol-innavation-centre.github[dot]io
interpol-innbovation-centre.github[dot]io
interpol-innhovation-centre.github[dot]io
interpol-inniovation-centre.github[dot]io
interpol-innivation-centre.github[dot]io
interpol-innjovation-centre.github[dot]io
interpol-innkovation-centre.github[dot]io
interpol-innkvation-centre.github[dot]io
interpol-innlovation-centre.github[dot]io
interpol-int[dot]cf
interpol-int[dot]com
interpol-int[dot]ga
interpol-int[dot]tk
interpol-intl[dot]org
interpol-london[dot]info
interpol-lyon[dot]fr
interpol-nigeria[dot]com
interpol-police[dot]tk
interpol-se[dot]com
interpol-sg[dot]com
interpol-sk[dot]ru
interpol-spain[dot]site
interpol[dot]af
interpol[dot]ag
interpol[dot]am
interpol[dot]asia
interpol[dot]at
interpol[dot]be
interpol[dot]biz
interpol[dot]ca
interpol[dot]cc
interpol[dot]cd
interpol[dot]cf
​[etc]
$ dnsdbflex --regex 'drugenforcementadministration' -A90d -l0 -j | jq -r '.rrname' | 2nd-level-dom | sort -u | grep drug
drugenforcementadministration.com
drugenforcementadministration.org
usdrugenforcementadministration.com
$ dnsdbflex --regex 'oregonstatepolice' -A90d -l0 -j | jq -r '.rrname' | sort -u | grep '^oregonstatepolice'
oregonstatepolice[dot]com.
oregonstatepolice.onmicrosoft.com.lookup.dkimwl[dot]org.
oregonstatepolice.sharepoint[dot]com.
oregonstatepolicedept.005.github[dot]com.
oregonstatepolicedept.1688[dot]com.
oregonstatepolicedept.24sessions[dot]com.
oregonstatepolicedept.88661[dot]online.
oregonstatepolicedept.8x8[dot]vc.
oregonstatepolicedept._domainkey.challonge[dot]com.
oregonstatepolicedept.acronis[dot]pl.
oregonstatepolicedept.adimg.github[dot]com.
oregonstatepolicedept.airblade.com[dot]tr.
oregonstatepolicedept.airblade[dot]lu.
$ dnsdbflex --regex 'losangelessheriff' -A90d -l0 -j | jq -r '.rrname' | 2nd-level-dom | sort -u | grep 'losangelessheriff'
losangelessheriff.com
losangelessheriffcustody.com
losangelessheriffdepartment.tk
losangelessheriffdept.xn--node
losangelessheriffsdepartment.com
losangelessheriffsdepartment.net
losangelessheriffsmuseum.com
losangelessheriffsupply.com

VI. Conclusion

We hope you’ve now developed a bit of a sense for how law enforcement agencies are sometimes targeted for online spoofing. When you know that this sort of activity is taking place, we hope you will be careful not to take what you see in an email message or on a web site at “face value.”

Legitimate law enforcement officers should always be able to have their status verified by contacting the officer’s agency at a number you’ve gotten from the phone book or via directory assistance. And if something feels wrong to you, consult an attorney for advice.

Appendix I. 2nd-level-dom

#!/usr/bin/perl
use strict;
use warnings;
use IO::Socket::SSL::PublicSuffix;

my $pslfile = '/usr/local/share/public_suffix_list.dat';
my $ps = IO::Socket::SSL::PublicSuffix->from_file($pslfile);

my $line;

foreach $line (<>) {
        chomp($line);
        my $root_domain = $ps->public_suffix($line,1);
        printf( "%s\n", $root_domain );
}

Joe St Sauver is a Distinguished Scientist and Director of Research with Farsight Security, Inc..