SlideShare a Scribd company logo
Bitsquatting
Exploiting Bit-Flips for Fun, or Profit?
Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven
Desmet. Frank Piessens, Wouter Joosen
WWW 2013
Humble beginnings
• There was a time when the Internet wasn’t yet a big thing
o Some sites existed, and people were starting to register
domain names
o But many were skeptical
• Some, however, were registering domains by the dozens
o Speculators
• wine.com
• cheapairlinetickets.com
• traveltobrazil.com
Cybersquatters
• In 1994, 2/3 of the Fortune 500 companies had not
registered the domains corresponding to their
trademarks[13]
o E.g. mcdonalds.com
• Some of the speculators, decided to push it a bit by
registering such domains, hoping for profit
o This practice was named “cybersquatting”
• In some cases, cybersquatters speculated the name of
future products and services:
o iphone6.com
WWW2012.ORG
WWW2013.ORG
WWW2016.ORG
Cybersquatting evolves
• Typosquatting
o Keyboard users, even experienced ones, make
mistakes while typing
o Registration of mistypes of popular domains
• foogle.com, ffacebook.com, twitte.com
• Homograph domains
o Registration of domains that look like, popular domains
• tvvitter.com, paypa1.com, ⅿicrosoft.com
o Higher chances of maliciousness
• Users arrive to these domains by clicking on malicious links
I heard some bits need help…
• Dinaburg, in 2011, suggested that random bit-flips could
happen in memory of hardware, storing a domain name
example.com
01100101 01111000 01100001…
01100101 01111001 01100001…
eyample.com
Bitsquatting
• To test his theory, Dinaburg registered 30 bitsquatting
domains, targeting popular domains
o E.g. mic2osoft.com and fbbdn.com
• In 8 months, he received:
o 52,317 requests from 12,949 unique IP addresses
o Requests were:
• From all over the world
• All popular OSs and browsers
• Some clearly not user-initiated, like “Windows Updates”
Our question…
• Given the crowded typosquatting field, were
cybersquatters convinced by Dinaburg’s attack?
o i.e., did they started registering bitsquatting domains?
• Bitsquatting-domain generator and crawler
o Investigated all possible bitsquatting domains daily, for
nine months.
o Recorded, HTML, inline JavaScript, redirections and
destination IP addresses
Results
• In 9 months, we
discovered:
o 5,366
different
bitsquatting
domains
o Targeting
491/500
Alexa
domains
Bitsquatting vs. typosquatting
Typosquatting Bitsquatting
71.8%
How are bitsquatting domains used?
• How does one explore 5,336 domains, with possibly 9
months worth of data for each domain?
o Bitsquatting, typosquatting, cybersquatting are all
branches of the same tree
• Prior research has shown that most “whitehat”
cybersquatters use one of the following monetization
techniques:
o Parking pages
o Affiliate abuse
Detecting parkers
• Used the hosts identified as large parking agencies by
Wang et al [17], together with a simple extra heuristic
o If these hosts appeared in any place in the gathered
pages (HTML, JavaScript, redirections), the page was
flagged as parked
o 2,782 domains were flagged as parked (51.8%)
• Domain-parking agencies are the biggest facilitators of
cybersquatters
Detecting affiliate abuse
• Abusers of affiliate programs gain money by product
commissions, with the help of unsuspecting users
o constintcontact.com -> constantcontact.com?pn=aff123
• 311 (5.7%) of the domains redirected the user back to the
correct authoritative site
o 211 belonged to the same company
o 58 were abusing affiliate programs
o 42 were unclassified
Bitsquatting experiments
• Hypothesis: Dinaburg’s idea sounds improbable, thus
there must be people trying to recreate it
• We searched each bitsquatting page for keywords that
would give away the experiment
o bitsquatting, squatting, experiment
• 61 of the 5,366 domains were classified as experiments
o E.g. iozilla.org and wozdpress.com
Need for further classification
• Using our automated methods, we were able to classify
more than half of all the bitsquatting pages
• To estimate the classes of the rest, we chose a 10%
random sample, which we manually analyzed
o Check source, WHOIS records, DBs of malicious sites
Results
Category Percentage
Legitimately owned 40.0%
Parked 15.4%
Redirect 15.0%
For sale 10.0%
Non-syndicated ads 6.8%
Other 6.8%
Malware 3.2%
Empty 2.7%
Results
Category Percentage
Legitimately owned 40.0%
Parked 15.4%
Redirect 15.0%
For sale 10.0%
Non-syndicated ads 6.8%
Other 6.8%
Malware 3.2%
Empty 2.7%
Overall:
More than 73% of the discovered bitsquatting domains were
exploited for profit
Huffingtonpost.com Case Study
Defenses
• Hardware Based
o Global use of ECC memory
• Software Based
o Sanity checks by software to detect unexpected
modifications
o DNSSEC
• Damage Control
o Companies register these domains before attackers do
• Incentive Removal
o Thousands of cybersquatters flock around tens of
domain parking agencies
Conclusion
• As the web expands, domain names can only become
more popular
• Bitsquatting is a new type of domain squatting, relying on
hardware failures rather than user mistakes
• Verdict is still out on the magnitute of the bitsquatting
problem and the practicality of the attack
• Cybersquatters, however, are using it in exactly the same
way as other types of domain squatting
nick.nikiforakis@cs.kuleuven.be
http://www.securitee.org

More Related Content

Similar to Bitsquatting: Exploiting bit-flips for fun, or profit?

I´m not a number, I´m a free man
I´m not a number, I´m a free manI´m not a number, I´m a free man
I´m not a number, I´m a free man
vicenteDiaz_KL
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PRISMA CSI
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
Arjith K Raj
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
John Bambenek
 
Internet Intelligence
Internet IntelligenceInternet Intelligence
Internet Intelligencerobcrayford
 
Internet Intelligence
Internet IntelligenceInternet Intelligence
Internet Intelligencerobcrayford
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
👀 Joe Gray
 
Natural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion JamNatural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion Jam
Craig Sullivan
 
Search Engine Google
Search Engine GoogleSearch Engine Google
Search Engine Google
Chidanand Byahatti
 
iWeb Scraping Services, India
iWeb Scraping Services, IndiaiWeb Scraping Services, India
iWeb Scraping Services, India
iWeb Scraping Services, India
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
Global Knowledge Training
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
Yury Leonychev
 
Increase Your Profits...Global
Increase Your Profits...GlobalIncrease Your Profits...Global
Increase Your Profits...Global
Aida Turbow
 
The future of crowdfunding
The future of crowdfundingThe future of crowdfunding
The future of crowdfunding
Wanfeng Chen
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
Jeroen Baert
 
Deep Web
Deep WebDeep Web
Deep Web
AbishaiDas
 
New Generic Top Level Domains
New Generic Top Level DomainsNew Generic Top Level Domains
New Generic Top Level Domains
Macinfosoft
 
The Art & Science of Bootstrapping
The Art & Science of BootstrappingThe Art & Science of Bootstrapping
The Art & Science of Bootstrapping
Nico Perez
 
Building Mobile Apps with HTML, CSS, and JavaScript
Building Mobile Apps with HTML, CSS, and JavaScriptBuilding Mobile Apps with HTML, CSS, and JavaScript
Building Mobile Apps with HTML, CSS, and JavaScriptJonathan Stark
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
Murray Security Services
 

Similar to Bitsquatting: Exploiting bit-flips for fun, or profit? (20)

I´m not a number, I´m a free man
I´m not a number, I´m a free manI´m not a number, I´m a free man
I´m not a number, I´m a free man
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
 
Internet Intelligence
Internet IntelligenceInternet Intelligence
Internet Intelligence
 
Internet Intelligence
Internet IntelligenceInternet Intelligence
Internet Intelligence
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Natural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion JamNatural born conversion killers - Conversion Jam
Natural born conversion killers - Conversion Jam
 
Search Engine Google
Search Engine GoogleSearch Engine Google
Search Engine Google
 
iWeb Scraping Services, India
iWeb Scraping Services, IndiaiWeb Scraping Services, India
iWeb Scraping Services, India
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 
Increase Your Profits...Global
Increase Your Profits...GlobalIncrease Your Profits...Global
Increase Your Profits...Global
 
The future of crowdfunding
The future of crowdfundingThe future of crowdfunding
The future of crowdfunding
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
New Generic Top Level Domains
New Generic Top Level DomainsNew Generic Top Level Domains
New Generic Top Level Domains
 
The Art & Science of Bootstrapping
The Art & Science of BootstrappingThe Art & Science of Bootstrapping
The Art & Science of Bootstrapping
 
Building Mobile Apps with HTML, CSS, and JavaScript
Building Mobile Apps with HTML, CSS, and JavaScriptBuilding Mobile Apps with HTML, CSS, and JavaScript
Building Mobile Apps with HTML, CSS, and JavaScript
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Bitsquatting: Exploiting bit-flips for fun, or profit?

  • 1. Bitsquatting Exploiting Bit-Flips for Fun, or Profit? Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet. Frank Piessens, Wouter Joosen WWW 2013
  • 2. Humble beginnings • There was a time when the Internet wasn’t yet a big thing o Some sites existed, and people were starting to register domain names o But many were skeptical • Some, however, were registering domains by the dozens o Speculators • wine.com • cheapairlinetickets.com • traveltobrazil.com
  • 3. Cybersquatters • In 1994, 2/3 of the Fortune 500 companies had not registered the domains corresponding to their trademarks[13] o E.g. mcdonalds.com • Some of the speculators, decided to push it a bit by registering such domains, hoping for profit o This practice was named “cybersquatting” • In some cases, cybersquatters speculated the name of future products and services: o iphone6.com
  • 7. Cybersquatting evolves • Typosquatting o Keyboard users, even experienced ones, make mistakes while typing o Registration of mistypes of popular domains • foogle.com, ffacebook.com, twitte.com • Homograph domains o Registration of domains that look like, popular domains • tvvitter.com, paypa1.com, ⅿicrosoft.com o Higher chances of maliciousness • Users arrive to these domains by clicking on malicious links
  • 8. I heard some bits need help… • Dinaburg, in 2011, suggested that random bit-flips could happen in memory of hardware, storing a domain name example.com 01100101 01111000 01100001… 01100101 01111001 01100001… eyample.com
  • 9. Bitsquatting • To test his theory, Dinaburg registered 30 bitsquatting domains, targeting popular domains o E.g. mic2osoft.com and fbbdn.com • In 8 months, he received: o 52,317 requests from 12,949 unique IP addresses o Requests were: • From all over the world • All popular OSs and browsers • Some clearly not user-initiated, like “Windows Updates”
  • 10. Our question… • Given the crowded typosquatting field, were cybersquatters convinced by Dinaburg’s attack? o i.e., did they started registering bitsquatting domains? • Bitsquatting-domain generator and crawler o Investigated all possible bitsquatting domains daily, for nine months. o Recorded, HTML, inline JavaScript, redirections and destination IP addresses
  • 11. Results • In 9 months, we discovered: o 5,366 different bitsquatting domains o Targeting 491/500 Alexa domains
  • 13. How are bitsquatting domains used? • How does one explore 5,336 domains, with possibly 9 months worth of data for each domain? o Bitsquatting, typosquatting, cybersquatting are all branches of the same tree • Prior research has shown that most “whitehat” cybersquatters use one of the following monetization techniques: o Parking pages o Affiliate abuse
  • 14.
  • 15. Detecting parkers • Used the hosts identified as large parking agencies by Wang et al [17], together with a simple extra heuristic o If these hosts appeared in any place in the gathered pages (HTML, JavaScript, redirections), the page was flagged as parked o 2,782 domains were flagged as parked (51.8%) • Domain-parking agencies are the biggest facilitators of cybersquatters
  • 16. Detecting affiliate abuse • Abusers of affiliate programs gain money by product commissions, with the help of unsuspecting users o constintcontact.com -> constantcontact.com?pn=aff123 • 311 (5.7%) of the domains redirected the user back to the correct authoritative site o 211 belonged to the same company o 58 were abusing affiliate programs o 42 were unclassified
  • 17. Bitsquatting experiments • Hypothesis: Dinaburg’s idea sounds improbable, thus there must be people trying to recreate it • We searched each bitsquatting page for keywords that would give away the experiment o bitsquatting, squatting, experiment • 61 of the 5,366 domains were classified as experiments o E.g. iozilla.org and wozdpress.com
  • 18. Need for further classification • Using our automated methods, we were able to classify more than half of all the bitsquatting pages • To estimate the classes of the rest, we chose a 10% random sample, which we manually analyzed o Check source, WHOIS records, DBs of malicious sites
  • 19. Results Category Percentage Legitimately owned 40.0% Parked 15.4% Redirect 15.0% For sale 10.0% Non-syndicated ads 6.8% Other 6.8% Malware 3.2% Empty 2.7%
  • 20. Results Category Percentage Legitimately owned 40.0% Parked 15.4% Redirect 15.0% For sale 10.0% Non-syndicated ads 6.8% Other 6.8% Malware 3.2% Empty 2.7% Overall: More than 73% of the discovered bitsquatting domains were exploited for profit
  • 22. Defenses • Hardware Based o Global use of ECC memory • Software Based o Sanity checks by software to detect unexpected modifications o DNSSEC • Damage Control o Companies register these domains before attackers do • Incentive Removal o Thousands of cybersquatters flock around tens of domain parking agencies
  • 23. Conclusion • As the web expands, domain names can only become more popular • Bitsquatting is a new type of domain squatting, relying on hardware failures rather than user mistakes • Verdict is still out on the magnitute of the bitsquatting problem and the practicality of the attack • Cybersquatters, however, are using it in exactly the same way as other types of domain squatting