SlideShare a Scribd company logo
1 of 2
Download to read offline
How one global retailer detected almost 2,000
domains impersonating their brand.
www.digitalshadows.com
Global Retailer Digital Shadows
Domain Infringement Concerns
Retailer was concerned by the extent to
which their domains are impersonated
online. The company suspected that these
domains targeted customers to harvest
their credentials or sell fraudulent goods.
While they had received ad hoc alerts from
customers, they had no way of identifying
these sites themselves.
Retailer inputed primary domain into asset
management page within the SearchLight portal.
Minutes later, the registered assets status moves
from "Submitted" to "Live".
SearchLight monitored for domains registered
that have slight permutations. This includes
homoglyphs, homophones, domainsquats,
swappers, repeaters, and other techniques.
When a registered domain closely resembled
that of the retailer, SearchLight sent a verified
alert, complete with context on the registrar and
corresponding attributes. Within the space of one
year, this particular retailer was alerted to almost
2,000 verified spoof domains (the average number
is closer to 300).
The analyst viewed alert and uses
screenshot, WHOIS information, and other
attributes, to make an assessment about
the potential risk of site.
Working with their legal team, the security
team informed Digital Shadows they wish
to pursue a Managed Takedown for a site
selling counterfeit goods.
Digital Shadows began Managed Takedown procedure.
Estimate timelines were provided, and and customer
checked status in the portal's "Takedown" tab.
Two days later, the takedown was confirmed and the
counterfeit site was no longer active.
Register Primary Domains in SearchLight
Monitor for Permutations of Domains
Receive Alerts from SearchLight
Begin Takedown
Confirm Takedown
Investigate Alert
Request Takedown
Realize Return on Investment
The retailer worked with Law Enforcement
to apprehend the perpetrators and
received a cut of the proceeds made by the
counterfeit site. This equated to hundreds of
thousands of dollars.
Adversaries impersonate legitimate domains for a
host of different motivations: it may be to harvest
credentials or dupe customers into purchasing
counterfeit goods. For one of our customers - a
global retailer - both of these motivations were a
concern.
The flowchart below demonstrates how, in this case, we worked
with a leading retailer to help mitigate the risks they faced with
domain impersonation. In doing so, the security team was able
to protect customers, return lost revenue, and secure their
online brand.
Detecting Spoof Domains
About Digital Shadows
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations
can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital
Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your
attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com.
Detecting Spoof Domains
Three Ways to Learn More
•	 Read more about Online Brand Security.
•	 Read more about our Managed
Takedown service.
•	 View examples yourself in SearchLight.
Sign up for a Test Drive to try for free.
Digital Shadows SearchLightTM
in Action
•	 Detected almost 2,000 domains in 1 year
•	 Included phishing and countefeit sites
•	 Took down sites to protect brand and
customers
•	 Return on Investment of several hundreds
of thousands of dollars.

More Related Content

What's hot

PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016
Paige Schaffer
 

What's hot (15)

Top 5 it security threats for 2015
Top 5 it security threats for 2015Top 5 it security threats for 2015
Top 5 it security threats for 2015
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
Phishing
PhishingPhishing
Phishing
 
Mod7 Lab Kohne
Mod7 Lab KohneMod7 Lab Kohne
Mod7 Lab Kohne
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016
 
Online payment gateway service providers testware informatics
Online payment gateway service providers testware informaticsOnline payment gateway service providers testware informatics
Online payment gateway service providers testware informatics
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Similar to Detecting Spoof Domains

CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
Chris Taylor
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
arri2009av
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaper
VAYTON
 

Similar to Detecting Spoof Domains (20)

Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down
 
Configuration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationConfiguration File of Trojan Targets Organization
Configuration File of Trojan Targets Organization
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ Overview
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
Ecommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud SchemeEcommerce Retailer Uncovers Coupon Fraud Scheme
Ecommerce Retailer Uncovers Coupon Fraud Scheme
 
Mobile Application Detected Impersonating Company Brand
Mobile Application Detected Impersonating Company BrandMobile Application Detected Impersonating Company Brand
Mobile Application Detected Impersonating Company Brand
 
Company Named on Target List for Hacktivist Campaign
Company Named on Target List for Hacktivist CampaignCompany Named on Target List for Hacktivist Campaign
Company Named on Target List for Hacktivist Campaign
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
 
Source Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by DeveloperSource Code and Admin Password Shared on Public Site by Developer
Source Code and Admin Password Shared on Public Site by Developer
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False PositivesEnergy and Utilities Firm Increases Productivity by Reducing False Positives
Energy and Utilities Firm Increases Productivity by Reducing False Positives
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk Protection
 
domain names management whitepaper
domain names management whitepaperdomain names management whitepaper
domain names management whitepaper
 

More from Digital Shadows

More from Digital Shadows (15)

Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | Infographic
 
Inadvertant Data Breaches
Inadvertant Data BreachesInadvertant Data Breaches
Inadvertant Data Breaches
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security Framework
 
Data Loss Detection
Data Loss DetectionData Loss Detection
Data Loss Detection
 
Digital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows Shadow Search
Digital Shadows Shadow Search
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
 
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsMitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB Indictment
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Digital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration Datasheet
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital Shadows
 
Digital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows Client Feedback
Digital Shadows Client Feedback
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital Shadows
 
Inglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick HollandInglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick Holland
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Detecting Spoof Domains

  • 1. How one global retailer detected almost 2,000 domains impersonating their brand. www.digitalshadows.com Global Retailer Digital Shadows Domain Infringement Concerns Retailer was concerned by the extent to which their domains are impersonated online. The company suspected that these domains targeted customers to harvest their credentials or sell fraudulent goods. While they had received ad hoc alerts from customers, they had no way of identifying these sites themselves. Retailer inputed primary domain into asset management page within the SearchLight portal. Minutes later, the registered assets status moves from "Submitted" to "Live". SearchLight monitored for domains registered that have slight permutations. This includes homoglyphs, homophones, domainsquats, swappers, repeaters, and other techniques. When a registered domain closely resembled that of the retailer, SearchLight sent a verified alert, complete with context on the registrar and corresponding attributes. Within the space of one year, this particular retailer was alerted to almost 2,000 verified spoof domains (the average number is closer to 300). The analyst viewed alert and uses screenshot, WHOIS information, and other attributes, to make an assessment about the potential risk of site. Working with their legal team, the security team informed Digital Shadows they wish to pursue a Managed Takedown for a site selling counterfeit goods. Digital Shadows began Managed Takedown procedure. Estimate timelines were provided, and and customer checked status in the portal's "Takedown" tab. Two days later, the takedown was confirmed and the counterfeit site was no longer active. Register Primary Domains in SearchLight Monitor for Permutations of Domains Receive Alerts from SearchLight Begin Takedown Confirm Takedown Investigate Alert Request Takedown Realize Return on Investment The retailer worked with Law Enforcement to apprehend the perpetrators and received a cut of the proceeds made by the counterfeit site. This equated to hundreds of thousands of dollars. Adversaries impersonate legitimate domains for a host of different motivations: it may be to harvest credentials or dupe customers into purchasing counterfeit goods. For one of our customers - a global retailer - both of these motivations were a concern. The flowchart below demonstrates how, in this case, we worked with a leading retailer to help mitigate the risks they faced with domain impersonation. In doing so, the security team was able to protect customers, return lost revenue, and secure their online brand. Detecting Spoof Domains
  • 2. About Digital Shadows Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Detecting Spoof Domains Three Ways to Learn More • Read more about Online Brand Security. • Read more about our Managed Takedown service. • View examples yourself in SearchLight. Sign up for a Test Drive to try for free. Digital Shadows SearchLightTM in Action • Detected almost 2,000 domains in 1 year • Included phishing and countefeit sites • Took down sites to protect brand and customers • Return on Investment of several hundreds of thousands of dollars.