Using bogus domains, cyber criminals can intercept messages containing sensitive personal and proprietary information For nearly as long as DNS as has been around, aggressive advertisers and malicious doers have used a technique called typosquatting to take advantage of the fact that most of us aren’t perfect typists: They buy up domains and set up realistic-looking yet malicious websites such as www.livve.com, www.live.cm, and www.liv.ecom to exploit users who incorrectly type live.com.I’ve considered typosquatting more of a nuisance than anything. The risk it poses isn’t nearly as high as that of other pressing threats, such as unpatched vulnerabilities and fake antivirus scams. However, a new typosquatting vector has emerged that warrants warning: Researchers at security think tank Godai Group found that through typosquatting tactics, they were able to dupe people into sending them legitimate, private emails intended for Fortune 500 email servers.[ Download Roger Grimes’s new “Data Loss Prevention Deep Dive” PDF expert guide today! | Stay up to date on the latest security developments with InfoWorld’s Security Central newsletter. | Get a dose of daily computer security news by following Roger Grimes on Twitter. ]The researchers set up their own email servers using various typosquatting, also known as doppelganger domains. Unwitting users then sent legitimate email to these domains, most likely unaware of their mistake. According to the final report, “During a six‐month span, over 120,000 individual emails (or 20GB of data) were collected, which included trade secrets, business invoices, employee PII, network diagrams, usernames and passwords, etc.” If — or rather, when — an employee, partner, or customer types your email domain name incorrectly when sending a message, it is possible for the owner of a doppelganger domain to intercept it. The sender won’t even receive a rejection message. A savvy squatter could send a plausible, convincing-looking response to further allay the sender’s suspicions. I’m not sure that even I would be suspicious, and I’ve been in the IT security business for 20 years.The authors even detailed how to perform a man-in-the-middle email attack, such that the sender and the intended recipient are essentially unaware of the plot. In a nutshell, the typosquatter sets up two bogus domains: one of the sender’s domain and one of the receiver’s. When the sender emails a message to the receive, the squatter can intercept it (assuming it isn’t protected using S/MIME or some other protection method), read it, then forward it on to the intended recipient’s domain using the bogus version of the sender’s domain. The receiver might not notice the misspelled domain name in sender address. Again, I’m not sure I would. This form of typosquatting attack hasn’t been widely adopted yet, but the researchers have convincingly demonstrated it’s a viable tact. More than likely, it is already being used in the real world. In fact, I’d bet that corporate-espionage types have been using email typosquatting for a long time. Why wouldn’t they? The researcher hit a gold mine of confidential information in a few months of testing. The author also noted that several “doppleganger domains” are already registered to China, a hot bed of APT (advanced persistent threat) activity.As is generally the case, organizations can take steps to defend themselves. One common tactic is for a company to register as many domains as possible that are potential typosquatting targets. The best defense is a good offense.Second, it can’t hurt to include information about this threat in the email security section of your end-user education documentation.Third (I got this idea from a client), consider using an outbound/inbound Internet proxy that automatically forbids or detains network traffic sent from sources that are unrecognized or unranked by proxy content-subscription ranking services. I was skeptical of this client’s approach at first, but he reports a very high success rate with a very low record of false positives.Readers, what other ideas do you have to combat typosquatting?This story, “Typosquatting hacks: Finger slips sink ships,” was originally published at InfoWorld.com. Keep up on the latest developments in network security and read more of Roger Grimes’s Security Adviser blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe